TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: What's the worst that could have happened had xz gone unnoticed?

17 pointsby nomilkabout 1 year ago
Like many, I&#x27;ve been reading about the deviousness of the xz exploit and understand it would give the author the ability to run arbitrary code on machines that had it installed.<p>Had this gone unnoticed, over, say, the next 12-36 months, what could have occurred if a maximally malicious actor did their worst? (assuming a variety of motivations - e.g. desire to attack rival state(s) a la stuxnet, greed, pure vandalism, other)<p>I suspect without additional exploits to get through other security layers on critical infrastructure, things like launching nukes from silos&#x2F;submarines, running carriers ashore, mass deleting icloud&#x2F;google drive&#x2F;onedrive would be out of the question. (that&#x27;s a guess).<p>It&#x27;s not known who&#x27;s responsible, nor their motivations, but at least in theory, what are some of the worst cases that could have happened had the exploit gone unnoticed?

5 comments

dagelfabout 1 year ago
All of the above, stealing of money, secrets, AI model weights, destruction, access to crypto passphrases, spam, impersonation, blackmail ... maybe not directly to systems with good security, but its like picking a lock, every bit of progress helps, security exists in layers, and one weak layer compromises the next... ssh is a pretty fundamental technology, and highly trusted.<p>There are wonderfully colorful podcasts about this. Darknet Diaries is pretty decent, and entertaining, for public consumption.
评论 #39925760 未加载
评论 #39926354 未加载
yogorenapanabout 1 year ago
The attacker would probably want to keep the exploit hidden, thus probably restricting themselves to data exfiltration rather than outright obvious attacks. Considering that’s it’s a state actor, perhaps people arrested and dark web sites shut down.
评论 #39927919 未加载
photonthugabout 1 year ago
SSH access is scary of course but lots of the machines involved would probably still be inaccessible in private networks. Other payloads for exfil scare me more.<p>What freaks me out is the idea of every android on the planet being compromised overnight. Since you can’t effectively opt out of updates these days, and since decompression tools are going to be involved with elevated privileges, it feels like we were pretty close to that kind of worst case
sitkackabout 1 year ago
Massive worm that would be nearly impossible to shutdown.<p>DC and Cloud takeover due to hitting an ssh bastion host.<p>Infecting codebases via compromised sshd+git. We really should be signing all of our commits.
ramses0about 1 year ago
The &quot;payload&quot; was devious in that it basically said: if $ssh_key &amp;&amp; $payload.sig &amp;&amp; $host.sig<p>Can&#x27;t (easily) be replayed with a network capture against a different host or with a different payload, and can&#x27;t be triggered without a specific key. Truly laser-like in focus.<p>My personal theory for &quot;next step&quot; would be: if uncompressing.contains( &quot;linux&quot; || &quot;curl&quot; ) =&gt; $extra.payload()<p>With such a skilled attack, and the potential to _deeply_ reach arbitrary public systems, imagine the chaos of &quot;ssh github.com &amp;&amp; pwn( curl, gzip, git, node, ... )&quot;<p>...each stealthier than the last. Most SHA-sums are against the archive, not the individual file contents. An untrustable archiver or network transfer tool (especially in combination!) is terrifying...
评论 #39926052 未加载