Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
Google Photos introduces a fun new way to turn yourself into a meme

Google Photos introduces a fun new way to turn yourself into a meme

23 January 2026
Age Verification Is Reaching a Global Tipping Point. Is TikTok’s Strategy a Good Compromise?

Age Verification Is Reaching a Global Tipping Point. Is TikTok’s Strategy a Good Compromise?

23 January 2026
A Second Super Mario Galaxy Movie Direct Will Air This Sunday

A Second Super Mario Galaxy Movie Direct Will Air This Sunday

23 January 2026
Facebook X (Twitter) Instagram
Just In
  • Google Photos introduces a fun new way to turn yourself into a meme
  • Age Verification Is Reaching a Global Tipping Point. Is TikTok’s Strategy a Good Compromise?
  • A Second Super Mario Galaxy Movie Direct Will Air This Sunday
  • A phone with a pop-up robot camera is launching soon
  • Review: We Are Rewind GB-001 Cassette Boombox
  • Vampire Survivors Spin-Off Vampire Crawlers Gets Gameplay Details, Demo In February
  • Adobe Acrobat now lets you edit PDFs by chatting with its AI Assistant
  • Review: Roborock Qrevo Curv 2 Flow
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » The XZ Backdoor: Everything You Need to Know
News

The XZ Backdoor: Everything You Need to Know

News RoomBy News Room2 April 20244 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
The XZ Backdoor: Everything You Need to Know
Share
Facebook Twitter LinkedIn Pinterest Email

On Friday, a lone Microsoft developer rocked the world when he revealed a backdoor had been intentionally planted in XZ Utils, an open source data compression utility available on almost all installations of Linux and other Unix-like operating systems. The person or people behind this project likely spent years on it. They were likely very close to seeing the backdoor update merged into Debian and Red Hat, the two biggest distributions of Linux, when an eagle-eyed software developer spotted something fishy.

“This might be the best-executed supply chain attack we’ve seen described in the open, and it’s a nightmare scenario: malicious, competent, authorized upstream in a widely used library,” software and cryptography engineer Filippo Valsorda said of the effort, which came frightfully close to succeeding.

Researchers have spent the weekend gathering clues. Here’s what we know so far.

What Is XZ Utils?

XZ Utils is nearly ubiquitous in Linux. It provides lossless data compression on virtually all Unix-like operating systems, including Linux. XZ Utils provides critical functions for compressing and decompressing data during all kinds of operations. XZ Utils also supports the legacy .lzma format, making this component even more crucial.

What Happened?

Andres Freund, a developer and engineer working on Microsoft’s PostgreSQL offerings, was recently troubleshooting performance problems a Debian system was experiencing with SSH, the most widely used protocol for remotely logging in to devices over the Internet. Specifically, SSH logins were consuming too many CPU cycles and were generating errors with valgrind, a utility for monitoring computer memory.

Through sheer luck and Freund’s careful eye, he eventually discovered the problems were the result of updates that had been made to XZ Utils. On Friday, Freund took to the Open Source Security List to disclose the updates were the result of someone intentionally planting a backdoor in the compression software.

What Does the Backdoor Do?

Malicious code added to XZ Utils versions 5.6.0 and 5.6.1 modified the way the software functions when performing operations related to .lzma compression or decompression. When these functions involved SSH, they allowed for malicious code to be executed with root privileges. This code allowed someone in possession of a predetermined encryption key to log in to the backdoored system over SSH. From then on, that person would have the same level of control as any authorized administrator.

How Did This Backdoor Come to Be?

It would appear that this backdoor was years in the making. In 2021, someone with the username JiaT75 made their first known commit to an open source project. In retrospect, the change to the libarchive project is suspicious, because it replaced the safe_fprint funcion with a variant that has long been recognized as less secure. No one noticed at the time.

The following year, JiaT75 submitted a patch over the XZ Utils mailing list, and, almost immediately, a never-before-seen participant named Jigar Kumar joined the discussion and argued that Lasse Collin, the longtime maintainer of XZ Utils, hadn’t been updating the software often or fast enough. Kumar, with the support of Dennis Ens and several other people who had never had a presence on the list, pressured Collin to bring on an additional developer to maintain the project.

In January 2023, JiaT75 made their first commit to XZ Utils. In the months following, JiaT75, who used the name Jia Tan, became increasingly involved in XZ Utils affairs. For instance, Tan replaced Collins’ contact information with their own on oss-fuzz, a project that scans open source software for vulnerabilities that can be exploited. Tan also requested that oss-fuzz disable the ifunc function during testing, a change that prevented it from detecting the malicious changes Tan would soon make to XZ Utils.

In February of this year, Tan issued commits for versions 5.6.0 and 5.6.1 of XZ Utils. The updates implemented the backdoor. In the following weeks, Tan or others appealed to developers of Ubuntu, Red Hat, and Debian to merge the updates into their OSes. Eventually, one of the two updates made its way into several releases, according to security firm Tenable. There’s more about Tan and the timeline here.

Can You Say More About What This Backdoor Does?

In a nutshell, it allows someone with the right private key to hijack sshd, the executable file responsible for making SSH connections, and from there to execute malicious commands. The backdoor is implemented through a five-stage loader that uses a series of simple but clever techniques to hide itself. It also provides the means for new payloads to be delivered without major changes being required.

Multiple people who have reverse-engineered the updates have much more to say about the backdoor. Developer Sam James provided an overview here.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNYT Connections: hints and answers for Tuesday, April 2
Next Article The 5 best outdoor projectors in 2024

Related Articles

Google Photos introduces a fun new way to turn yourself into a meme
News

Google Photos introduces a fun new way to turn yourself into a meme

23 January 2026
Age Verification Is Reaching a Global Tipping Point. Is TikTok’s Strategy a Good Compromise?
News

Age Verification Is Reaching a Global Tipping Point. Is TikTok’s Strategy a Good Compromise?

23 January 2026
A phone with a pop-up robot camera is launching soon
News

A phone with a pop-up robot camera is launching soon

23 January 2026
Review: We Are Rewind GB-001 Cassette Boombox
News

Review: We Are Rewind GB-001 Cassette Boombox

23 January 2026
Adobe Acrobat now lets you edit PDFs by chatting with its AI Assistant
News

Adobe Acrobat now lets you edit PDFs by chatting with its AI Assistant

23 January 2026
Review: Roborock Qrevo Curv 2 Flow
News

Review: Roborock Qrevo Curv 2 Flow

23 January 2026
Demo
Top Articles
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024107 Views
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024101 Views
Costco partners with Electric Era to bring back EV charging in the U.S.

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202497 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Vampire Survivors Spin-Off Vampire Crawlers Gets Gameplay Details, Demo In February Gaming

Vampire Survivors Spin-Off Vampire Crawlers Gets Gameplay Details, Demo In February

News Room23 January 2026
Adobe Acrobat now lets you edit PDFs by chatting with its AI Assistant News

Adobe Acrobat now lets you edit PDFs by chatting with its AI Assistant

News Room23 January 2026
Review: Roborock Qrevo Curv 2 Flow News

Review: Roborock Qrevo Curv 2 Flow

News Room23 January 2026
Most Popular
The Spectacular Burnout of a Solar Panel Salesman

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025136 Views
ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024107 Views
5 laptops to buy instead of the M4 MacBook Pro

5 laptops to buy instead of the M4 MacBook Pro

17 November 2024101 Views
Our Picks
A phone with a pop-up robot camera is launching soon

A phone with a pop-up robot camera is launching soon

23 January 2026
Review: We Are Rewind GB-001 Cassette Boombox

Review: We Are Rewind GB-001 Cassette Boombox

23 January 2026
Vampire Survivors Spin-Off Vampire Crawlers Gets Gameplay Details, Demo In February

Vampire Survivors Spin-Off Vampire Crawlers Gets Gameplay Details, Demo In February

23 January 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2026 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.