10th Indian Delegation to Dubai, Gitex & Expand North Star – World’s Largest Startup Investor Connect
Cyber Security

How one volunteer stopped a backdoor from exposing Linux systems worldwide


Linux, the most widely used open source operating system in the world, narrowly escaped a massive cyber attack over Easter weekend, all thanks to one volunteer.

The backdoor had been inserted into a recent release of a Linux compression format called XZ Utils, a tool that is little-known outside the Linux world but is used in nearly every Linux distribution to compresses large files, making them easier to transfer. If it had spread more widely, an untold number of systems could have been left compromised for years.

And as Ars Technica noted in its exhaustive recap, the culprit had been working on the project out in the open.

The vulnerability, inserted into Linux’s remote log-in, only exposed itself to a single key, so that it could hide from scans of public computers. As Ben Thompson writes in Stratechery.  “the majority of the world’s computers would be vulnerable and no one would know.”

The story of the XZ backdoor’s discovery starts in the early morning of March 29th, as San Francisco-based Microsoft developer Andres Freund posted on Mastodon and sent an email to OpenWall’s security mailing list with the heading: “backdoor in upstream xz/liblzma leading to ssh server compromise.”

Freund, who volunteers as a “maintainer” for PostgreSQL, a Linux-based database, noticed a few strange things over the past few weeks while running tests. Encrypted log-ins to liblzma, part of the XZ compression library, were using up a ton of CPU. None of the performance tools he used revealed anything, Freund wrote on Mastodon. This immediately made him suspicious, and he remembered an “odd complaint” from a Postgres user a couple of weeks earlier about Valgrind, Linux’s program that checks for memory errors. 

After some sleuthing, Freund eventually discovered what was wrong. “The upstream xz repository and the xz tarballs have been backdoored,” noted Freund in his email. The malicious code was in versions ​​5.6.0 and 5.6.1 of the xz tools and libraries. 

Shortly after, enterprise opensource software company Red Hat sent out an emergency security alert for users of Fedora Rawhide and Fedora Linux 40. Ultimately, the company concluded that the beta version of Fedora Linux 40 contained two affected versions of the xz libraries. Fedora Rawhide versions likely received versions 5.6.0 or 5.6.1 as well.

PLEASE IMMEDIATELY STOP USAGE OF ANY FEDORA RAWHIDE INSTANCES for work or personal activity. Fedora Rawhide will be reverted to xz-5.4.x shortly, and once that is done, Fedora Rawhide instances can safely be redeployed.

Although a beta version of Debian, the free Linux distribution, contained compromised packages, its security team acted swiftly to revert them. “Right now no Debian stable versions are known to be affected,” wrote Debian’s Salvatore Bonaccorso in a security alert to users on Friday evening.

Freund later identified the person who submitted the malicious code as one of two main xz Utils developers, known as JiaT75, or Jia Tan. “Given the activity over several weeks, the committer is either directly involved or there was some quite severe compromise of their system. Unfortunately the latter looks like the less likely explanation, given they communicated on various lists about the “fixes” mentioned above,” wrote Freund in his analysis, after linking several workarounds that were made by JiaT75.

JiaT75 was a familiar name: they’d worked side-by-side with the original developer of .xz file format, Lasse Collin, for a while. As programmer Russ Cox noted in his timeline, JiaT75 started by sending apparently legitimate patches to the XZ mailing list in October of 2021.

Other arms of the scheme unfolded a few months later, as two other identities, Jigar Kumar and Dennis Ens, began emailing complaints to Collin about bugs and the project’s slow development. However, as noted in reports by Evan Boehs and others, “Kumar” and “Ens” were never seen outside the XZ community, leading investigators to believe both are fakes that existed only to help Jia Tan get into position to deliver the backdoored code.

An email from “Jigar Kumar” pressuring the developer of XZ Utils to relinquish control of the project.
Image: Screenshot from The Mail Archive

“I am sorry about your mental health issues, but its important to be aware of your own limits. I get that this is a hobby project for all contributors, but the community desires more,” wrote Ens in one message, while Kumar said in another that “Progress will not happen until there is new maintainer.”

In the midst of this back and forth, Collins wrote that “I haven’t lost interest but my ability to care has been fairly limited mostly due to longterm mental health issues but also due to some other things,” and suggested Jia Tan would take on a bigger role. “It’s also good to keep in mind that this is an unpaid hobby project,” he concluded. The emails from “Kumar” and “Ens” continued until Tan was added as a maintainer later that year, able to make alterations, and attempt to get the backdoored package into Linux distributions with more authority.

The xz backdoor incident and its aftermath are an example of both the beauty of open source and a striking vulnerability in the internet’s infrastructure.

A developer behind FFmpeg, a popular open-source media package, highlighted the problem in a tweet, saying “The xz fiasco has shown how a dependence on unpaid volunteers can cause major problems. Trillion dollar corporations expect free and urgent support from volunteers.” And they brought receipts, pointing out how they dealt with a “high priority” bug affecting Microsoft Teams.

Despite Microsoft’s dependence on its software, the developer writes, “After politely requesting a support contract from Microsoft for long term maintenance, they offered a one-time payment of a few thousand dollars instead…investments in maintenance and sustainability are unsexy and probably won’t get a middle manager their promotion but pay off a thousandfold over many years.”

Details of who is behind “JiaT75,” how they executed their plan, and the extent of the damage are being unearthed by an army of developers and cybersecurity professionals, both on social media and online forums. But that happens without direct financial support from many of the companies and organizations who benefit from being able to use secure software.





Source link

by 9to5mac

As the world becomes more digital, the requirement for cyber defense has never been greater. As businesses, governments, and citizens depend greatly on technology, the cybersecurity practice is expanding very quickly in 2025. From data theft to ransomware attacks, the danger has evolved to be sophisticated, forcing companies to invest in innovative cybersecurity measures. Consequently, career prospects in this area are flourishing. Whether you are a student, IT personnel, or an individual thinking of changing their vocation, learning the cybersecurity scope in the future will prepare you for a very rewarding and sought-after profession. Why Cyber Security Matters More Than Ever With sudden digitization in all sectors, cyberattacks have also kept pace. Be it any organization, a small startup, or a multinational corporation, everything is now a cybercriminal target. With increasing threats, the scope of cybersecurity widens to include everything from network security to cloud security and ethical hacking. In 2025, cybersecurity is no longer an IT problem — it’s a business necessity. This evolution guarantees that experts with cybersecurity knowledge will continue to be in greater demand.  Cyber Security Scope in India: Rising Demand and Opportunities   India is one of the fastest-growing digital economies and is seeing a higher demand for cyber protection. The government is promoting initiatives like Digital India, and more businesses are going online. As a result, the cybersecurity scope in India has expanded significantly. Every sector, from banking and healthcare to e-commerce and education, is vulnerable to cyber threats.   Major Indian cities like Bangalore, Hyderabad, Pune, and Delhi are becoming hubs for cybersecurity. They offer attractive job roles and competitive salary packages to skilled professionals.   Key Areas Expanding Cyber Security Scope in the Future   Here are the major areas contributing to the growing scope of cybersecurity in the future:   1. Cloud Security   As companies move to cloud platforms like AWS, Azure, and Google Cloud, protecting data on these platforms is crucial.   2. IoT Security   As smart devices increase, so do vulnerabilities. IoT security ensures that everything from smart homes to industrial sensors is protected.   3. AI and Machine Learning in Cyber Security   Artificial intelligence is used to detect threats in real time, predict attacks, and automate responses. This technology is reshaping the scope of cybersecurity dramatically.   4. Blockchain Security   With the rise of Web3 and decentralized finance (DeFi), blockchain security is becoming an important area within the future scope of cybersecurity. Careers in Cyber Security (2025) The increasing cybersecurity scope in India has created many exciting job roles across industries. Below you will see some high-demand roles in 2025: Job Roles  Average Security salary (per annum)  Security Analyst ₹6–8 Lakhs Penetration Tester (Ethical Hacker) ₹8–12 Lakhs Cyber Security Consultant ₹10–15 Lakhs Security Architect ₹20–25 Lakhs Chief Information Security Officer (CISO) ₹40 Lakhs and above Each of these job roles contributes in its unique way to bolster the total digital defense of an organization, further expanding the cybersecurity scope nationally and globally. In-Demand Skills for Cybersecurity Roles You will need a strong skillset, both technical and …

by Team SNFYI

As senior citizens embrace the digital age, they are finding themselves at a greater risk than ever before. With unfamiliar technology and fast-evolving fraud tactics, it’s no surprise that more and more cybercrime victims are over 50—many losing not just money, but their sense of security and trust.  In response to this growing crisis, Truecaller, the leading global communications platform, has announced a transformative partnership with Khyaal, India’s number one app for senior citizens, committed to the empowerment and well-being of India’s elderly. This collaboration uniquely blends Khyaal’s deep understanding of seniors and expertise in creating meaningful engagement, along with Truecaller’s cutting-edge caller identification technology. Together, they create a robust and secure shield that fosters trusted, reliable communication, building a safer and more connected community for India’s elderly population.  All Khyaal members will receive an exclusive 50% discount on Truecaller Premium membership, ensuring they have access to the most advanced caller identification and spam protection features. Additionally, as part of this comprehensive safety initiative, Khyaal and Truecaller will co-create dedicated educational content. This includes “New Scam Highlights” sessions that decode emerging fraud tactics, interactive “Spot the Scam” workshops and contests, essential guidelines for handling calls from unknown numbers, and powerful testimonials from Khyaal seniors who have successfully identified and avoided scam attempts. These initiatives will be delivered through a mix of digital and on-ground formats. Seniors will have access to the workshops and sessions on the Khyaal app. The partnership will extend beyond digital boundaries through Khyaal’s “50Above50″ event, featuring interactive awareness sessions and dedicated safety booths that offer seniors practical, hands-on education and insights on digital safety.” While the free version of Truecaller is also functional, the Premium subscription includes enhanced spam blocking and several advanced safety features which can better protect senior citizens against fraudulent and unwanted communication. This technology-driven approach provides an additional layer of prevention, complementing Khyaal’s ongoing efforts to empower seniors through education and solutions to create a safer world for seniors. “The digital age holds tremendous promise for our seniors—offering connection, convenience, and community. But it also brings new threats they’re often unprepared for,” said Rishit Jhunjhunwala, Global CEO, Truecaller. “We’ve heard far too many heartbreaking stories of older individuals duped by scams. Our partnership with Khyaal is a meaningful step toward equipping them with the knowledge and tools to navigate this landscape safely.” Commenting on the partnership, Hemanshu Jain, Founder & CEO, Khyaal said, “The statistics are deeply concerning: seniors are losing their hard-earned savings to increasingly sophisticated scammers who exploit their trust and unfamiliarity with digital fraud tactics. The emotional toll of falling victim to such scams can be devastating, often leading to anxiety and a loss of confidence in using digital tools. At Khyaal, we’ve long recognised this silent crisis and have been committed to raising awareness through digital workshops. This partnership with Truecaller takes that commitment further. By learning to identify red flags, equipping themselves with the right tools like Truecaller, and staying informed about emerging scam tactics, seniors can maintain their independence while protecting themselves …

by Team SNFYI

For years, global supply chains have operated on a fundamental faith: that if materials are moving, everything is working. That approach worked — until cybersecurity threats became not only routine, but sophisticated and devastating. Data leaks and ransomware are no longer affecting individual businesses due to the emergence of advanced persistent threats. They send ripples through supply networks and have an impact on national security, financial systems, and basic services. This is particularly true for industries linked to government contracts. Where sensitive defense information passes through hundreds of subcontractors, an individual organization’s approach to security becomes a part of the broader risk. This isn’t just about protecting one company’s data — it’s about protecting entire ecosystems. Acknowledging this, the Department of Defense of the United States introduced a framework-based cybersecurity certification model. Among these, the Cybersecurity Maturity Model Certification — CMMC — is a key cornerstone in the effort to reform how government supply chains can operate securely. With ever-changing policy developments and recent announcements, CMMC updates are now shaking up the landscape for contractors, suppliers, and service providers. Why CMMC News Matters In The Current Scenario The cybersecurity environment for federal contractors is changing. The DoD’s implementation of CMMC, first announced in 2020, remains a work in progress. Changes, updates, and policy updates all mean companies need to be watching the CMMC news to stay compliant. CMMC implements a tiered approach for cybersecurity requirements for businesses doing business with the DoD that have access to FCI and CUI. Unlike self-attestation models, CMMC requires third-party assessments, especially for businesses participating in higher-risk jobs. Recent news updates have included: These shifts are not optional. And not meeting CMMC requirements now can result in disqualification from doing business with the DoD altogether. That should have supply chain companies in manufacturing, technology, logistics, and more reading about CMMC news. Supply Chains On Red Alert for Cybersecurity And big financial institutions, health care providers, and other operators of critical infrastructure are all taking notice. CMMC marks a move to formal, enforceable cybersecurity standards, in contrast to voluntary guidelines. Industry experts also note that CMMC’s configuration, including third-party accreditation and defined levels of maturity, as well as publicly trackable compliance, could serve as a model for future regulatory efforts in various industries. Staying Current on CMMC News: Why It Matters Given that CMMC is rapidly evolving, not being current isn’t an option. Policy changes, interim rules and enforcement updates revise timeframes and alter compliance expectations. Firms that are constantly kept abreast of the CMMC can enjoy several benefits, some of which are mentioned in the rundown: Final Thoughts As cyber threats become increasingly sophisticated, organized certification frameworks such as CMMC are becoming the rule rather than the exception. For contractors, suppliers and service providers, keeping up to date with CMMC news is about more than checking compliance boxes. This is a matter of future-proofing business activity and staying up to date to continue operating in markets that are becoming increasingly security-aware. As the bar for …