Unveiling the Critical Attack Path for Implanting Backdoors in Supply Chains: Practical Experience from XZ

Research output: Chapter in Book/Report/Conference proceedingConference proceedingspeer-review

Abstract

Recently, a previously unseen supply chain attack due to a backdoor in XZ Utils has been identified by A. Freund. This particular attack leverages highly sophisticated attack techniques, starting with social engineering attacks against the open source community up to implanting a backdoor in obfuscated binary blobs. This malware is designed to empower the attacker(s) to remotely run commands on vulnerable servers utilizing SSH evading authentication. A reverse dependency analysis revealed that the affected library is used by almost 30,000 packages in Debian and Ubuntu—the same order of magnitude as the GNU standard C library (glibc/libc6), a dependency for roughly 50,000 packages on these systems. This fact highlights the severity of such supply chain attacks and raises concerns about further backdoored packages still undetected in the wild. This paper identifies the critical attack path for successful implantation of such a backdoor and abstracts general key takeaways for future detection and mitigation of similar attacks. We also present SketchyCrawler, an open-source tool prototype designed to illustrate crawling repositories to reveal ‘sketchy’ signs of potential backdoor implantation attempts.

Original languageEnglish
Title of host publicationCryptology and Network Security
Subtitle of host publication24th International Conference, CANS 2025, Proceedings
EditorsYongdae Kim, Atsuko Miyaji, Mehdi Tibouchi
Place of PublicationOsaka, Japan
PublisherSpringer Singapore
Pages521-541
Number of pages21
Edition1
ISBN (Electronic)978-981-95-4434-9
ISBN (Print)978-981-95-4433-2
DOIs
Publication statusE-pub ahead of print - 13 Nov 2025

Publication series

NameLecture Notes in Computer Science
Volume16351 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Fields of science

  • 102 Computer Sciences
  • 102016 IT security

JKU Focus areas

  • Digital Transformation

Cite this