Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How did Teaonher find a user’s driver’s license spilling within 10 minutes?

Zoom and Xerox releases critical security update fix privilege escalation and RCE flaws

Why I finally left Spotify

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk
Identity

Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk

userBy userAugust 12, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 12, 2025Ravi LakshmananMalware/Container Security

A new study discovered Docker Images from Docker Hub, and images containing the infamous XZ Utils backdoor.

Even more troublesome is the fact that other images are constructed on top of these infected basic images, effectively transmitting infections transitively, Binarly Research says in a report shared with Hacker News.

The firmware security company said it had discovered a total of 35 images to ship along with the backdoor. The incident once again highlights the risks faced by the software supply chain.

The XZ UTILS supply chain event (CVE-2024-3094, CVSS score: 10.0) was revealed in late March 2024 when Andres Freund alarmed the backdoor embedded in XZ Utils versions 5.6.0 and 5.6.1.

Cybersecurity

Further analysis of malicious code and broader compromises has led to some surprising discoveries. First of all, the backdoor can lead to unauthorized remote access, allowing the execution of any payload via SSH.

Specifically, the backdoors located in the Liblzma.so library and used by OpenSSH servers are designed to be triggered when a client interacts with an infected SSH server.

By hijacking the RSA_Public_Decrypt function using GLIBC’s IFUNC mechanism, malicious code allowed an attacker who owns a particular private key to bypass authentication and execute the root command remotely,” explained Binarly.

The second discovery was that the change was pushed by a developer named “Jia Tan” (Jiat75). He has contributed to open source projects for almost two years, building trust until he is given the responsibility of the maintainer, demonstrating the meticulous nature of the attack.

“It was clearly a very complicated state-sponsored operation, with impressive refinement and multi-year plans,” Binary said at the time. “This complex, professionally designed comprehensive porting framework has not been developed for one-shot operations.”

The company’s latest research shows that the impact of the incident continues to send aftershocks through the open force ecosystem, even after all these months.

This includes discovering 12 Debian Docker images, including one of the XZ UTILS backdoors, and another set of secondary images, including compromised Debian images.

Identity Security Risk Assessment

Binarly said he reported the base image to the Debian maintainer. He said he made a deliberate choice to make these artifacts available as historical curiosity.

However, the company noted that leaving publicly available Docker images, including backdoors that can reach potential networks, is a serious security risk despite the criteria necessary for successful exploitation: the need to access networks to infected devices by running SSH services.

“The XZ-UTILS backdoor incident shows that even short-lived malicious code can be propagated to the Docker ecosystem without being noticed in official container images for a long time,” he added.

“The delay highlights how these artifacts quietly persist and propagate through the CI pipeline and container ecosystem, reinforcing the critical need for continuous binary level monitoring beyond simple version tracking.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleJames Webb’s telescope finds the earliest black holes in the known universe and looks “as long as you can actually go.”
Next Article The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions
user
  • Website

Related Posts

Zoom and Xerox releases critical security update fix privilege escalation and RCE flaws

August 13, 2025

Fortinet warns about Fortisiem vulnerability (CVE-2025-25256) in the Wild in the Wild Exploit Code

August 13, 2025

Important features that security leaders need to know

August 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How did Teaonher find a user’s driver’s license spilling within 10 minutes?

Zoom and Xerox releases critical security update fix privilege escalation and RCE flaws

Why I finally left Spotify

Fortinet warns about Fortisiem vulnerability (CVE-2025-25256) in the Wild in the Wild Exploit Code

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Web 3.0 Gets Personal: FySelf’s TwinH Paves the Way for User-Controlled Digital Identity

Google’s Genie 3: The Dawn of General AI?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.