News Arena

Join us

Home
/

an-anonymous-coder-nearly-hacked-a-big-chunk-of-the-internet-how-worried-should-we-be

Technology

An anonymous coder nearly hacked a big chunk of the internet. How worried should we be?

Late last week, security experts uncovered a serious and deliberate flaw that could leave networked Linux computers susceptible to malicious attacks.

News Arena Network - Los Angeles - UPDATED: April 5, 2024, 07:41 AM - 7 mins read

Representative Image of a hacker.

An anonymous coder nearly hacked a big chunk of the internet. How worried should we be?


Outside the world of open-source software, it’s likely few people would have heard about XZ Utils, a small but widely used tool for data compression in Linux systems. 

 

But late last week, security experts uncovered a serious and deliberate flaw that could leave networked Linux computers susceptible to malicious attacks.

 

The flaw has since been confirmed as a critical issue that could allow a knowledgeable hacker to gain control over vulnerable Linux systems.

 

Because Linux is used throughout the world in email and web servers and application platforms, this vulnerability could have given the attacker silent access to vital information held on computers throughout the world – potentially including the device you’re using right now to read this.

 

Major software vulnerabilities, such as the SolarWinds hack and the Heartbleed bug, are nothing new – but this one is very different.

 

The XZ Utils hack attempt took advantage of the way open-source software development often works. Like many open-source projects, XZ Utils is a crucial and widely used tool – and it is maintained largely by a single volunteer, working in their spare time. This system has created huge benefits for the world in the form of free software, but it also carries unique risks.

 

Open source and XZ Utils, First of all, a brief refresher on open-source software. Most commercial software, such as the Windows operating system or the Instagram app, is “closed-source” – which means nobody except its creators can read or modify the source code.

 

By contrast, with “open-source” software, the source code is openly available and people are free to do what they like with it.

 

Open-source software is very common, particularly in the “nuts and bolts” of software which consumers don’t see, and is hugely valuable. One recent study estimated the total value of open-source software in use today at USD 8.8 trillion.

 

Until around two years ago, the XZ Utils project was maintained by a developer called Lasse Collin. Around that time, an account using the name Jia Tan submitted an improvement to the software.

 

Not long after, some previously unknown accounts popped up to report bugs and submit feature requests to Collin, putting pressure on him to take on a helper in maintaining the project. Jia Tan was the logical candidate.

 

Over the next two years, Jia Tan became more and more involved and, we now know, introduced a carefully hidden weapon into the software’s source code.

The revised code secretly alters another piece of software, a ubiquitous network security tool called OpenSSH, so that it passes malicious code to a target system. As a result, a specific intruder will be able to run any code they like on the target machine.

 

The latest version of XZ Utils, containing the backdoor, was set to be included in popular Linux distributions and rolled out across the world. However, it was caught just in time when a Microsoft engineer investigated some minor memory irregularities in his system.

 

A rapid response What does this incident mean for open-source software? Well, despite initial appearances, it doesn’t mean open-source software is insecure, unreliable or untrustworthy.

 

Because all the code is available for public scrutiny, developers worldwide could rapidly begin analysing the backdoor and the history of how it was implemented. These efforts could be documented, distributed and shared, and the specific malicious code fragments could be identified and removed.

A response on this scale would not have been possible with closed-source software.

 

An attacker would need to take a somewhat different approach to target a closed-source tool, perhaps by posing as a company employee for a long period and exploiting the weaknesses of the closed-source software production system (such as bureaucracy, hierarchy, unclear reporting lines and poor knowledge sharing).

 

However, if they did achieve such a backdoor in proprietary software, there would be no chance of large-scale, distributed code auditing.

Lessons to be learned This case is a valuable opportunity to learn about weaknesses and vulnerabilities of a different sort.

 

First, it demonstrates the ease with which online relations between anonymous users and developers can become toxic. In fact, the attack depended on the normalisation of these toxic interactions.

 

The social engineering part of the attack appears to have used anonymous “sockpuppet” accounts to guilt-trip and emotionally coerce the lead maintainer into accepting minor, seemingly innocuous code additions over a period of years, pressuring them to cede development control to Jia Tan.

 

One user account complained: You ignore the many patches rotting away on this mailing list. Right now you choke your repo.

 

When the developer professed mental health issues, another account chided: I am sorry about your mental health issues, but it's important to be aware of your own limits.

 

Individually such comments might appear innocuous, but in concert become a mob.

 

We need to help developers and maintainers better understand the human aspects of coding, and the social relationships that affect, underpin or dictate how distributed code is produced. There is much work to be done, particularly to improve the recognition of the importance of mental health.

 

A second lesson is the importance of recognising “obfuscation”, a process often used by hackers to make software code and processes difficult to understand or reverse-engineer. Many universities do not teach this as part of a standard software engineering course.

 

Third, some systems may still be running the dangerous versions of XZ Utils. Many popular smart devices (such as refrigerators, wearables and home automation tools) run on Linux. These devices often reach an age at which it is no longer financially viable for their manufacturers to update their software – meaning they do not receive patches for newly discovered security holes.

 

And finally, whoever is behind the attack – some have speculated it may be a state actor – has had free access to a variety of codebases over a two-year period, perpetrating a careful and patient deception. Even now, that adversary will be learning from how system administrators, Linux distribution producers and codebase maintainers are reacting to the attack.

 

Where to from here? Code maintainers around the world are now thinking about their vulnerabilities at a strategic and tactical level. It is not only their code itself they will be worrying about, but also their code distribution mechanisms and software assembly processes.

 

My colleague David Lacey, who runs the not-for-profit cybersecurity organisation IDCARE, often reminds me the situation facing cybersecurity professionals is well articulated by a statement from the IRA.

 

In the wake of their unsuccessful bombing of the Brighton Grand Hotel in 1984, the terrorist organisation chillingly claimed: Today we were unlucky, but remember we only have to be lucky once. You will have to be lucky always.

This story was sourced from The Conversation, via a syndicated feed.

Related News
Union Minister for IT and Electronics, Ashwini Vaishnaw, announced on Wednesday that discussions regarding regulations for Artificial Intelligence (AI) are currently underway, stressing the necessity of achieving a political consensus.

Vaishnaw stresses need for political consensus on AI

July 3, 2024, 08:06 AM - 2 mins read

UBS is experiencing a transformation in client interactions driven by artificial intelligence, according to Sabine Keller-Busse, head of the Swiss bank's domestic business.

AI drives new client proposals at UBS

July 2, 2024, 06:27 AM - 1 min read

In picture: Xenophrys apatani, named after Arunachal Pradesh's Apatani tribe, known for their conservation efforts in Arunachal Pradesh's Lower Subansiri Valley.

ZSI discovers new species of horned frog in Arunachal

July 2, 2024, 04:40 AM - 2 mins read

BITS Pilani announces a five-year research agreement with Mercedes-Benz India for advancing technology solutions and academic collaboration.

BITS Pilani, Mercedes-Benz ink 5-year research deal

July 1, 2024, 04:15 AM - 2 mins read

India to send astronauts with SERA, Blue Origin's astronaut program

India to send astronauts with SERA, Blue Origin

July 1, 2024, 01:37 AM - 2 mins read

Google announced it has taken a stake in Taiwan's New Green Power (NGP) and could purchase up to 300 megawatts of renewable energy from the BlackRock fund-owned firm.

Google invests in NGP to cut carbon emissions

July 1, 2024, 01:28 AM - 2 mins read

OpenAI unveils CriticGPT to improve GPT-4

OpenAI unveils CriticGPT to improve GPT-4

June 29, 2024, 01:40 AM - 2 mins read

Scientists at the University of Tokyo have discovered a revolutionary method to attach living human skin to robotic faces without causing damage or tearing.

Robots can now smile with real skin

June 28, 2024, 07:51 AM - 2 mins read

Are family videos on YouTube training AI models?

Are family videos on YouTube training AI models?

June 28, 2024, 05:29 AM - 7 mins read

An English sentence translated into Khasi using Google Translate.

Meghalaya's Khasi language now on Google translate

June 28, 2024, 04:49 AM - 2 mins read

https://www.instagram.com/thelaughclubofficial/
https://www.instagram.com/burraahhh_/

Technology

See All
Union Minister for IT and Electronics, Ashwini Vaishnaw, announced on Wednesday that discussions regarding regulations for Artificial Intelligence (AI) are currently underway, stressing the necessity of achieving a political consensus.

Vaishnaw stresses need for political consensus on AI

July 3, 2024, 08:06 AM - 2 mins read

Speaking at the 'Global IndiaAI Summit', Minister Vaishnaw highlighted the importance of societal understanding of both the potential and threats posed by AI. "All sections of society must fully understand the threats and potential of Artificial Intelligence only then we should approach legal action," he told reporters.

Read more
A recent assessment highlights the vast gap India must bridge to match the capabilities of other leading nations in quantum technologies, despite launching a National Quantum Mission worth ₹6,000 crores to develop key future technologies. 

India faces quantum tech challenge despite ₹6,000 cr mission

July 3, 2024, 01:31 AM - 3 mins read

“It is commendable that India is among the 17 countries with formal national quantum missions and is among the top 12 countries in terms of committed investments. At the same time, we must recognize that India is lagging behind the global leaders in quantum technologies and needs to ramp up both R&D and translational aspects to catch up with them,” the assessment said.

Read more
Image for representative use only.

Aditya-L1 completes initial halo orbit around Sun-Earth L1

July 2, 2024, 08:10 AM - 2 mins read

Launched on September 2, 2023, the Aditya-L1 mission aims to observe the sun from the advantageous Lagrangian point L1.

Read more
UBS is experiencing a transformation in client interactions driven by artificial intelligence, according to Sabine Keller-Busse, head of the Swiss bank's domestic business.

AI drives new client proposals at UBS

July 2, 2024, 06:27 AM - 1 min read

Speaking at the Point Zero Forum in Zurich on Tuesday, Keller-Busse compared this shift to how patients approach doctors with preformed ideas about their ailments, now clients are using AI to generate proposals for the bank.

Read more
In picture: Xenophrys apatani, named after Arunachal Pradesh's Apatani tribe, known for their conservation efforts in Arunachal Pradesh's Lower Subansiri Valley.

ZSI discovers new species of horned frog in Arunachal

July 2, 2024, 04:40 AM - 2 mins read

Named Xenophrys apatani after Arunachal Pradesh's Apatani tribe, known for their conservation efforts in the Lower Subansiri Valley, the species exhibits unique genetic and physical traits.

Read more
BITS Pilani announces a five-year research agreement with Mercedes-Benz India for advancing technology solutions and academic collaboration.

BITS Pilani, Mercedes-Benz ink 5-year research deal

July 1, 2024, 04:15 AM - 2 mins read

According to a statement issued by the institute, the collaboration aims to establish a robust framework for joint research, fostering the creation of intellectual property in cutting-edge technology solutions and promoting academic collaboration. 

Read more
India to send astronauts with SERA, Blue Origin's astronaut program

India to send astronauts with SERA, Blue Origin

July 1, 2024, 01:37 AM - 2 mins read

The US-based Space Exploration and Research Agency (SERA) and Blue Origin announced India as a partner in their human spaceflight program, offering Indian citizens a chance to fly on Blue Origin’s reusable rocket, New Shepard, past the Karman line into space.

Read more
Google announced it has taken a stake in Taiwan's New Green Power (NGP) and could purchase up to 300 megawatts of renewable energy from the BlackRock fund-owned firm.

Google invests in NGP to cut carbon emissions

July 1, 2024, 01:28 AM - 2 mins read

Taiwan, a significant hub for Google's cloud technology with a data center and company offices, relies heavily on fossil fuels for nearly 85% of its power, according to Amanda Peterson Corio, Google's Global Head of Data Center Energy. "The goal of this investment is really to support the build-out of a large-scale solar pipeline in Taiwan," Corio told Reuters.

Read more
OpenAI unveils CriticGPT to improve GPT-4

OpenAI unveils CriticGPT to improve GPT-4

June 29, 2024, 01:40 AM - 2 mins read

CriticGPT is still in development and is not yet accessible to users or testers. Its objective is to improve the quality of AI-generated code.

Read more
Scientists at the University of Tokyo have discovered a revolutionary method to attach living human skin to robotic faces without causing damage or tearing.

Robots can now smile with real skin

June 28, 2024, 07:51 AM - 2 mins read

The team created ‘anchors’ by applying collagen gel to small V-shaped holes on the robot’s exterior surface.  According to Professor Takeuchi, this method offers “a more seamless and durable attachment.” The combination of human skin's flexibility and the strong adhesion provided by these anchors allows for mechanical movement without damaging the skin.

Read more
Are family videos on YouTube training AI models?

Are family videos on YouTube training AI models?

June 28, 2024, 05:28 AM - 7 mins read

The promised artificial intelligence revolution requires data. Lots and lots of data. OpenAI and Google have begun using YouTube videos to train their text-based AI models. But what does the YouTube archive actually include? 

Read more
An English sentence translated into Khasi using Google Translate.

Meghalaya's Khasi language now on Google translate

June 28, 2024, 04:49 AM - 2 mins read

This addition, along with 109 other languages, marks a significant step in bridging communication gaps for millions worldwide.

Read more

TOP CATEGORIES

  • Nation

QUICK LINKS

About us Rss FeedSitemapPrivacy PolicyTerms & Condition
logo

2024 News Arena India Pvt Ltd | All rights reserved | The Ideaz Factory