Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Elon Musk suggests successive xAI withdrawals were a push, not a pull

Microsoft announced that hackers are exploiting a critical zero-day bug to target Windows and Office users.

How to join a16z’s highly competitive Speedrun startup accelerator program

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk
Identity

Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk

userBy userAugust 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 12, 2025Ravi LakshmananMalware/Container Security

A new study discovered Docker Images from Docker Hub, and images containing the infamous XZ Utils backdoor.

Even more troublesome is the fact that other images are constructed on top of these infected basic images, effectively transmitting infections transitively, Binarly Research says in a report shared with Hacker News.

The firmware security company said it had discovered a total of 35 images to ship along with the backdoor. The incident once again highlights the risks faced by the software supply chain.

The XZ UTILS supply chain event (CVE-2024-3094, CVSS score: 10.0) was revealed in late March 2024 when Andres Freund alarmed the backdoor embedded in XZ Utils versions 5.6.0 and 5.6.1.

Cybersecurity

Further analysis of malicious code and broader compromises has led to some surprising discoveries. First of all, the backdoor can lead to unauthorized remote access, allowing the execution of any payload via SSH.

Specifically, the backdoors located in the Liblzma.so library and used by OpenSSH servers are designed to be triggered when a client interacts with an infected SSH server.

By hijacking the RSA_Public_Decrypt function using GLIBC’s IFUNC mechanism, malicious code allowed an attacker who owns a particular private key to bypass authentication and execute the root command remotely,” explained Binarly.

The second discovery was that the change was pushed by a developer named “Jia Tan” (Jiat75). He has contributed to open source projects for almost two years, building trust until he is given the responsibility of the maintainer, demonstrating the meticulous nature of the attack.

“It was clearly a very complicated state-sponsored operation, with impressive refinement and multi-year plans,” Binary said at the time. “This complex, professionally designed comprehensive porting framework has not been developed for one-shot operations.”

The company’s latest research shows that the impact of the incident continues to send aftershocks through the open force ecosystem, even after all these months.

This includes discovering 12 Debian Docker images, including one of the XZ UTILS backdoors, and another set of secondary images, including compromised Debian images.

Identity Security Risk Assessment

Binarly said he reported the base image to the Debian maintainer. He said he made a deliberate choice to make these artifacts available as historical curiosity.

However, the company noted that leaving publicly available Docker images, including backdoors that can reach potential networks, is a serious security risk despite the criteria necessary for successful exploitation: the need to access networks to infected devices by running SSH services.

“The XZ-UTILS backdoor incident shows that even short-lived malicious code can be propagated to the Docker ecosystem without being noticed in official container images for a long time,” he added.

“The delay highlights how these artifacts quietly persist and propagate through the CI pipeline and container ecosystem, reinforcing the critical need for continuous binary level monitoring beyond simple version tracking.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleJames Webb’s telescope finds the earliest black holes in the known universe and looks “as long as you can actually go.”
Next Article The “illegal wave” is 65 feet tall, but it is not an “unusual event,” North Sea data reveals.
user
  • Website

Related Posts

First malicious Outlook add-in discovered that steals over 4,000 Microsoft credentials

February 11, 2026

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

February 11, 2026

Public training opens the door to crypto mining in Fortune 500 cloud environments

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Elon Musk suggests successive xAI withdrawals were a push, not a pull

Microsoft announced that hackers are exploiting a critical zero-day bug to target Windows and Office users.

How to join a16z’s highly competitive Speedrun startup accelerator program

Why are the economics of orbital AI so cruel?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.