transcript

Screenshot of github showing part of the commit message of this commit with this text:

Remove the backdoor found in 5.6.0 and 5.6.1 (CVE-2024-3094).

While the backdoor was inactive (and thus harmless) without inserting
a small trigger code into the build system when the source package was
created, it's good to remove this anyway:

  - The executable payloads were embedded as binary blobs in
    the test files. This was a blatant violation of the
    Debian Free Software Guidelines.

  - On machines that see lots bots poking at the SSH port, the backdoor
    noticeably increased CPU load, resulting in degraded user experience
    and thus overwhelmingly negative user feedback.

  - The maintainer who added the backdoor has disappeared.

  - Backdoors are bad for security.

This reverts the following without making any other changes:

The sentence “This was a blatant violation of the Debian Free Software Guidelines” is highlighted.

Below the github screenshot is a frame of the 1998 film The Big Lebowski with the meme caption “What, are you a fucking park ranger now?” from the scene where that line was spoken.

    • TheGalacticVoid@lemm.ee
      link
      fedilink
      arrow-up
      9
      arrow-down
      1
      ·
      9 months ago

      I’m surprised that nobody suggested that he was a kidnapped dev. This seems like a different implementation of the pig butchering scams that target ordinary people.

        • TheGalacticVoid@lemm.ee
          link
          fedilink
          arrow-up
          6
          ·
          9 months ago

          I wasn’t joking.

          A good chunk of scam calls and texts come from people who themselves are victims of kidnapping. Many of those victims (primarily in Asia) got into the position they were in because they were looking for work, went to a different country to start a promised job, and then got trapped and forced to work for scam centers that do social engineering attacks.

          These scam centers are sophisticated to the point where they can develop very legitimate-looking crypto trading platforms for targets in the US and other wealthy countries. They then assign one of the kidnapped people to a target. These kidnapped people then social engineer their way for months to get what their captors want - usually money in the aforementioned trading platform. Then, they cut all contact once they have control of the funds.

          How does this relate to XZ? Well, if they can kidnap ordinary people looking for jobs, there’s not much stopping them from including devs in their pool of targets. Afterward, it’s just a rinse and repeat of what they’d done before.

          If you want to look more into pig butchering, John Oliver has a great episode on it.

          • davel [he/him]@lemmy.ml
            link
            fedilink
            English
            arrow-up
            10
            ·
            9 months ago

            You don’t kidnap extremely highly skilled internet malware developers and force them to code for you, you just pay them appropriately.

            • Iapar@feddit.de
              link
              fedilink
              arrow-up
              9
              ·
              9 months ago

              Jupp. If you trap someone highly skilled and give that person a weapon, the chances are good that this person will use that against you.

              Like how does a less skilled person know that this code will not send location to the police with a message?