Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The man who bet everything on AI and Bill Belichick

Making earth observation data useful to people

MSS claims NSA used 42 cyber tools in multi-stage attack on Beijing Time System

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk
Identity

Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk

userBy userAugust 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 12, 2025Ravi LakshmananMalware/Container Security

A new study discovered Docker Images from Docker Hub, and images containing the infamous XZ Utils backdoor.

Even more troublesome is the fact that other images are constructed on top of these infected basic images, effectively transmitting infections transitively, Binarly Research says in a report shared with Hacker News.

The firmware security company said it had discovered a total of 35 images to ship along with the backdoor. The incident once again highlights the risks faced by the software supply chain.

The XZ UTILS supply chain event (CVE-2024-3094, CVSS score: 10.0) was revealed in late March 2024 when Andres Freund alarmed the backdoor embedded in XZ Utils versions 5.6.0 and 5.6.1.

Cybersecurity

Further analysis of malicious code and broader compromises has led to some surprising discoveries. First of all, the backdoor can lead to unauthorized remote access, allowing the execution of any payload via SSH.

Specifically, the backdoors located in the Liblzma.so library and used by OpenSSH servers are designed to be triggered when a client interacts with an infected SSH server.

By hijacking the RSA_Public_Decrypt function using GLIBC’s IFUNC mechanism, malicious code allowed an attacker who owns a particular private key to bypass authentication and execute the root command remotely,” explained Binarly.

The second discovery was that the change was pushed by a developer named “Jia Tan” (Jiat75). He has contributed to open source projects for almost two years, building trust until he is given the responsibility of the maintainer, demonstrating the meticulous nature of the attack.

“It was clearly a very complicated state-sponsored operation, with impressive refinement and multi-year plans,” Binary said at the time. “This complex, professionally designed comprehensive porting framework has not been developed for one-shot operations.”

The company’s latest research shows that the impact of the incident continues to send aftershocks through the open force ecosystem, even after all these months.

This includes discovering 12 Debian Docker images, including one of the XZ UTILS backdoors, and another set of secondary images, including compromised Debian images.

Identity Security Risk Assessment

Binarly said he reported the base image to the Debian maintainer. He said he made a deliberate choice to make these artifacts available as historical curiosity.

However, the company noted that leaving publicly available Docker images, including backdoors that can reach potential networks, is a serious security risk despite the criteria necessary for successful exploitation: the need to access networks to infected devices by running SSH services.

“The XZ-UTILS backdoor incident shows that even short-lived malicious code can be propagated to the Docker ecosystem without being noticed in official container images for a long time,” he added.

“The delay highlights how these artifacts quietly persist and propagate through the CI pipeline and container ecosystem, reinforcing the critical need for continuous binary level monitoring beyond simple version tracking.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleJames Webb’s telescope finds the earliest black holes in the known universe and looks “as long as you can actually go.”
Next Article The “illegal wave” is 65 feet tall, but it is not an “unusual event,” North Sea data reveals.
user
  • Website

Related Posts

MSS claims NSA used 42 cyber tools in multi-stage attack on Beijing Time System

October 20, 2025

Europol dismantles SIM farm network running 49 million fake accounts worldwide

October 19, 2025

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The man who bet everything on AI and Bill Belichick

Making earth observation data useful to people

MSS claims NSA used 42 cyber tools in multi-stage attack on Beijing Time System

OpenAI’s “Embarrassing” Mathematics | Tech Crunch

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.