Тёмный

The Amazingly Scary XZ SSHD Backdoor 

SANS Institute
Подписаться 59 тыс.
Просмотров 4,6 тыс.
50% 1

Last week, Andres Freund, a developer working at Microsoft, found a sophisticated backdoor in xz-utils, a popular compression library. The backdoor was not only sophisticated from a technical point of view, but the threat actor had clearly prepared extensively, using social engineering to sneak the code into xz-utils and convince some Linux distributions to consider including it.

In this Wait Just an Infosec episode, our guest host Dr. Johannes Ullrich is joined by SANS Internet Storm Center Handler Bojan Zdrnja who will discuss what he learned through reverse engineering the backdoor. He will cover how the backdoor was hidden and what techniques the threat actor used to discourage reverse engineering. We will close by discussing the social engineering tactics observed and the implications for the open-source supply chain at large.

Read more about this vulnerability in the ICS Diary:
isc.sans.edu/d...

Опубликовано:

 

15 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 2   
@StarOfDavidKush
@StarOfDavidKush 3 месяца назад
This is the best show ever. SANS Institute is awesome! 💚
@bharatgurbaxani4206
@bharatgurbaxani4206 5 месяцев назад
Can you publish the slides used here?
Далее
Navigating the Path to Zero Trust in 2024
31:50
What Everyone Missed About The Linux Hack
20:24
Просмотров 286 тыс.
Doors Harpy Hare (Doors 2 Animation)
00:16
Просмотров 702 тыс.
The Stuxnet Story: What REALLY happened at Natanz
37:38
AI Security: Understanding the Threat Landscape
57:22
Просмотров 1,9 тыс.
I'll Let Myself In: Tactics of Physical Pen Testers
44:56
CROC Talks -  XZ Utils backdoor explained
12:58
Просмотров 2,6 тыс.
Social Engineering - How Bad Guys Hack Users
14:58
Просмотров 51 тыс.
The Tragedy of systemd
47:18
Просмотров 1,1 млн