The XZ Utils Backdoor (2024)

A Sleeper Agent in the Linux Supply Chain

In March 2024, a quiet open-source project almost became the launchpad for one of the most devastating cyber intrusions in history.

The software in question wasn’t a flashy cloud platform or a Fortune 500 company. It was XZ Utils, a humble compression tool quietly embedded deep within the Linux ecosystem.

But hidden inside one of its latest releases was something extraordinary, a backdoor capable of giving attackers remote access to millions of Linux systems around the world.

What makes this story remarkable isn’t just the technical sophistication of the attack.

It’s the patience.

Because the attacker didn’t hack the system.

They joined the project.

For more than two years, they slowly built trust inside the open-source community, until one day they had enough influence to quietly plant a digital time bomb.

And if not for one engineer noticing something strange about his SSH login times, the attack might never have been discovered.


The Story

XZ Utils is a widely used data compression library included in most Linux distributions. Many applications rely on it indirectly, including components tied to the Secure Shell (SSH) service used to remotely access servers.

In early 2024, versions 5.6.0 and 5.6.1 of XZ Utils were released. Buried inside these versions was malicious code that introduced a backdoor into the liblzma compression library.

Under specific conditions, this backdoor could interfere with the OpenSSH authentication process, allowing an attacker with the correct private key to execute code remotely on a target system.

In cybersecurity terms, this was a nightmare scenario:

  • A critical supply chain compromise
  • Embedded in core infrastructure
  • Potentially exposing millions of Linux machines

The vulnerability was assigned CVE-2024-3094 and given the highest possible severity score: CVSS 10.0.

But the real story started long before the malicious code appeared.


The Long Game

The attacker didn’t simply upload malicious code.

Instead, they infiltrated the project.

Beginning around 2021, a developer using the alias “Jia Tan” began contributing to the XZ Utils project. Over time, they submitted helpful patches, improved build processes, and became a trusted contributor.

Gradually, pressure began appearing within the community suggesting that the project’s original maintainer was overwhelmed and needed help.

Other online accounts — suspected to be sockpuppets — echoed the same message.

Eventually, Jia Tan was granted maintainer privileges.

That trust gave them exactly what they needed.

In early 2024, the compromised versions of XZ Utils were released.

Hidden within seemingly harmless test files was compressed malicious code that would be activated during the build process, injecting the backdoor into the compiled library.

It was a surgical supply-chain attack.


The Accidental Discovery

The attack might have gone unnoticed if not for an unexpected clue.

Microsoft engineer Andres Freund noticed something odd while testing Debian Linux.

SSH logins were running slightly slower than expected.

The delay was subtle, but persistent.

Curious, Freund began digging deeper into the system’s libraries and eventually traced the issue to XZ Utils.

What he uncovered was extraordinary:
a carefully hidden backdoor embedded in a core compression library.

On 29 March 2024, he publicly disclosed the findings to the security community.

The reaction was immediate.

Linux distributions rushed to remove the malicious versions and revert to safe releases within hours.


Who Was Behind the Attack?

The identity of “Jia Tan” remains unknown.

Security researchers believe the name was almost certainly a pseudonym, and investigations uncovered several other accounts likely used to support the infiltration effort.

Because of the sophistication, patience, and operational security involved, some analysts suspect the operation may have been carried out by a nation-state threat actor.

One theory suggests possible links to APT29, a group widely believed to operate on behalf of Russian intelligence.

However, there is currently no definitive attribution.

Whoever carried it out demonstrated an advanced understanding of:

  • open-source ecosystems
  • community trust dynamics
  • software build pipelines
  • stealthy code injection techniques

Why This Attack Was So Dangerous

The true risk lay in the position of the compromised software.

XZ Utils sits deep in the Linux software stack and is present in most distributions.

If the backdoor had propagated into stable releases and production servers, attackers could potentially have gained access to millions of machines via SSH authentication bypass.

Some experts believe this could have become one of the most widespread cyber backdoors ever deployed.

Instead, it was caught just in time.


Lessons Learned

1. Trust Is the Weakest Link in Supply Chains

The attacker didn’t exploit a technical vulnerability at first, they exploited community trust.

2. Open Source Is Powerful — But Under-Resourced

Many critical infrastructure projects are maintained by a small number of volunteers.

3. Supply Chain Attacks Are the New Battlefield

Instead of attacking organizations directly, adversaries increasingly target software dependencies.

4. Small Anomalies Matter

This attack was discovered because someone investigated a slight delay in SSH login performance.


Why This Story Matters

The XZ Utils backdoor wasn’t just another vulnerability.

It was a glimpse into the future of cyber warfare.

A patient attacker embedded themselves inside a trusted open-source project for years, waiting for the moment when they could quietly compromise the global software supply chain.

And the only reason the attack failed…

was because one engineer noticed something that felt slightly off.


A person in a hoodie typing on a laptop featuring Linux code and logo.

Sources & Further Reading

  1. Freund, A. – Backdoor in upstream xz/liblzma leading to ssh server compromise
    https://www.openwall.com/lists/oss-security/2024/03/29/4
  2. Datadog Security Labs – XZ Backdoor CVE-2024-3094 Explained
    https://securitylabs.datadoghq.com/articles/xz-backdoor-cve-2024-3094/
  3. Kaspersky – CVE-2024-3094: Malicious code in Linux distributions
    https://www.kaspersky.com/blog/cve-2024-3094-vulnerability-backdoor
  4. HackerOne – XZ Utils CVE-2024-3094: A Tale of Broken Trust
    https://www.hackerone.com/blog/xz-utils-cve-2024-3094-tale-broken-trust-curious-persistence-and-call-action
  5. Russ Cox – Timeline of the XZ Open Source Attack
    https://research.swtch.com/xz-timeline
  6. CISA – Supply Chain Compromise Affecting XZ Utils
    https://www.cisa.gov/news-events/alerts

Leave a comment