underisk [none/use name]@hexbear.net to technology@hexbear.netEnglish · 9 months agoAnalysis of bash-stage obfuscation used to hide the liblzma/xz backdoorgynvael.coldwind.plexternal-linkmessage-square2fedilinkarrow-up113arrow-down10file-textcross-posted to: hackernews@lemmy.smeargle.fans
arrow-up113arrow-down1external-linkAnalysis of bash-stage obfuscation used to hide the liblzma/xz backdoorgynvael.coldwind.plunderisk [none/use name]@hexbear.net to technology@hexbear.netEnglish · 9 months agomessage-square2fedilinkfile-textcross-posted to: hackernews@lemmy.smeargle.fans
payload appears to have been hidden in test data then decrypted and injected during the build process.
minus-squareunderisk [none/use name]@hexbear.netOPlinkfedilinkEnglisharrow-up2·9 months agoPreliminary stuff I read yesterday suggests that it’s RCE triggered by a signal sent to SSHD. Safest bet is to nuke your system if you had the exploitable library running with an exposed sshd.
Preliminary stuff I read yesterday suggests that it’s RCE triggered by a signal sent to SSHD. Safest bet is to nuke your system if you had the exploitable library running with an exposed sshd.