A Sleeper Agent in the Linux Supply Chain
In March 2024, a quiet open-source project almost became the launchpad for one of the most devastating cyber intrusions in history.
The software in question wasn’t a flashy cloud platform or a Fortune 500 company. It was XZ Utils, a humble compression tool quietly embedded deep within the Linux ecosystem.
But hidden inside one of its latest releases was something extraordinary, a backdoor capable of giving attackers remote access to millions of Linux systems around the world.
What makes this story remarkable isn’t just the technical sophistication of the attack.
It’s the patience.
Because the attacker didn’t hack the system.
They joined the project.
For more than two years, they slowly built trust inside the open-source community, until one day they had enough influence to quietly plant a digital time bomb.
And if not for one engineer noticing something strange about his SSH login times, the attack might never have been discovered.
The Story
XZ Utils is a widely used data compression library included in most Linux distributions. Many applications rely on it indirectly, including components tied to the Secure Shell (SSH) service used to remotely access servers.
In early 2024, versions 5.6.0 and 5.6.1 of XZ Utils were released. Buried inside these versions was malicious code that introduced a backdoor into the liblzma compression library.
Under specific conditions, this backdoor could interfere with the OpenSSH authentication process, allowing an attacker with the correct private key to execute code remotely on a target system.
In cybersecurity terms, this was a nightmare scenario:
- A critical supply chain compromise
- Embedded in core infrastructure
- Potentially exposing millions of Linux machines
The vulnerability was assigned CVE-2024-3094 and given the highest possible severity score: CVSS 10.0.
But the real story started long before the malicious code appeared.
The Long Game
The attacker didn’t simply upload malicious code.
Instead, they infiltrated the project.
Beginning around 2021, a developer using the alias “Jia Tan” began contributing to the XZ Utils project. Over time, they submitted helpful patches, improved build processes, and became a trusted contributor.
Gradually, pressure began appearing within the community suggesting that the project’s original maintainer was overwhelmed and needed help.
Other online accounts — suspected to be sockpuppets — echoed the same message.
Eventually, Jia Tan was granted maintainer privileges.
That trust gave them exactly what they needed.
In early 2024, the compromised versions of XZ Utils were released.
Hidden within seemingly harmless test files was compressed malicious code that would be activated during the build process, injecting the backdoor into the compiled library.
It was a surgical supply-chain attack.
The Accidental Discovery
The attack might have gone unnoticed if not for an unexpected clue.
Microsoft engineer Andres Freund noticed something odd while testing Debian Linux.
SSH logins were running slightly slower than expected.
The delay was subtle, but persistent.
Curious, Freund began digging deeper into the system’s libraries and eventually traced the issue to XZ Utils.
What he uncovered was extraordinary:
a carefully hidden backdoor embedded in a core compression library.
On 29 March 2024, he publicly disclosed the findings to the security community.
The reaction was immediate.
Linux distributions rushed to remove the malicious versions and revert to safe releases within hours.
Who Was Behind the Attack?
The identity of “Jia Tan” remains unknown.
Security researchers believe the name was almost certainly a pseudonym, and investigations uncovered several other accounts likely used to support the infiltration effort.
Because of the sophistication, patience, and operational security involved, some analysts suspect the operation may have been carried out by a nation-state threat actor.
One theory suggests possible links to APT29, a group widely believed to operate on behalf of Russian intelligence.
However, there is currently no definitive attribution.
Whoever carried it out demonstrated an advanced understanding of:
- open-source ecosystems
- community trust dynamics
- software build pipelines
- stealthy code injection techniques
Why This Attack Was So Dangerous
The true risk lay in the position of the compromised software.
XZ Utils sits deep in the Linux software stack and is present in most distributions.
If the backdoor had propagated into stable releases and production servers, attackers could potentially have gained access to millions of machines via SSH authentication bypass.
Some experts believe this could have become one of the most widespread cyber backdoors ever deployed.
Instead, it was caught just in time.
Lessons Learned
1. Trust Is the Weakest Link in Supply Chains
The attacker didn’t exploit a technical vulnerability at first, they exploited community trust.
2. Open Source Is Powerful — But Under-Resourced
Many critical infrastructure projects are maintained by a small number of volunteers.
3. Supply Chain Attacks Are the New Battlefield
Instead of attacking organizations directly, adversaries increasingly target software dependencies.
4. Small Anomalies Matter
This attack was discovered because someone investigated a slight delay in SSH login performance.
Why This Story Matters
The XZ Utils backdoor wasn’t just another vulnerability.
It was a glimpse into the future of cyber warfare.
A patient attacker embedded themselves inside a trusted open-source project for years, waiting for the moment when they could quietly compromise the global software supply chain.
And the only reason the attack failed…
was because one engineer noticed something that felt slightly off.

Sources & Further Reading
- Freund, A. – Backdoor in upstream xz/liblzma leading to ssh server compromise
https://www.openwall.com/lists/oss-security/2024/03/29/4 - Datadog Security Labs – XZ Backdoor CVE-2024-3094 Explained
https://securitylabs.datadoghq.com/articles/xz-backdoor-cve-2024-3094/ - Kaspersky – CVE-2024-3094: Malicious code in Linux distributions
https://www.kaspersky.com/blog/cve-2024-3094-vulnerability-backdoor - HackerOne – XZ Utils CVE-2024-3094: A Tale of Broken Trust
https://www.hackerone.com/blog/xz-utils-cve-2024-3094-tale-broken-trust-curious-persistence-and-call-action - Russ Cox – Timeline of the XZ Open Source Attack
https://research.swtch.com/xz-timeline - CISA – Supply Chain Compromise Affecting XZ Utils
https://www.cisa.gov/news-events/alerts
Leave a comment