Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year

Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year

Posted on August 13, 2025August 13, 2025 By CWS

The cybersecurity group continues to grapple with the lingering results of the XZ Utils backdoor, a complicated provide chain assault that shook the trade in March 2024.

What started as a rigorously orchestrated two-year marketing campaign by the pseudonymous developer ‘Jia Tan’ has advanced right into a persistent risk that extends far past its preliminary discovery.

The malicious actor methodically constructed credibility inside the XZ Utils challenge by quite a few reputable contributions earlier than inserting a fancy backdoor into the xz-utils packages, affecting main Linux distributions together with Debian, Fedora, and OpenSUSE.

The backdoor operates by a complicated mechanism embedded inside the liblzma.so library, which interfaces straight with OpenSSH servers.

When triggered by consumer interactions with contaminated SSH servers, the malicious code establishes three vital hooks focusing on the RSA_public_decrypt, RSA_get0_key, and EVP_PKEY_set1_RSA features.

This intricate assault chain begins with modified IFUNC resolvers for lzma_crc32 and lzma_crc64 features, making a pathway for backdoor performance that remained undetected for months.

Latest investigations by Binarly researchers have revealed that the XZ Utils backdoor continues to pose important dangers to containerized environments greater than a 12 months after its preliminary discovery.

Their complete evaluation of Docker Hub repositories has uncovered over 35 contaminated pictures, with 12 Debian-based containers nonetheless publicly obtainable and actively distributing the compromised code.

This discovery highlights a vital blind spot in container safety, the place historic artifacts containing recognized vulnerabilities persist in public repositories.

The analysis group’s findings lengthen past first-generation contaminated pictures. By means of systematic scanning of Docker Hub’s intensive repository community, Binarly analysts recognized quite a few second-order containers constructed upon the compromised Debian base pictures.

Response from the Debian maintainer to our disclosure (Supply – Binarly)

These by-product containers, spanning numerous use circumstances from growth environments to specialised purposes, show how provide chain compromises can propagate by containerized ecosystems with minimal visibility.

Persistence and Propagation Mechanisms

The backdoor’s persistence inside Docker environments reveals a basic problem in container safety lifecycle administration. Not like conventional software program updates that may be systematically patched, container pictures typically stay static historic artifacts as soon as revealed.

The malicious code embedded in these containers maintains its performance by the liblzma.so library’s integration with system processes, making certain that any SSH server operating inside an contaminated container turns into a possible assault vector.

The technical implementation leverages IFUNC resolver modifications that redirect normal compression operate calls by malicious handlers.

When the container initializes SSH providers, the backdoor establishes its hooks inside the sshd course of context, creating persistent entry channels that bypass conventional safety monitoring.

This method demonstrates the attacker’s deep understanding of each containerization applied sciences and system-level Linux operations, making detection significantly difficult for organizations relying solely on surface-level vulnerability scanning instruments.

Increase your SOC and assist your group defend your small business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Backdoor, Docker, Images, Infamous, Planted, Year

Post navigation

Previous Post: Key Capabilities Security Leaders Need to Know
Next Post: Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code

Related Posts

Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar Agent Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar Agent Cyber Security News
Threat Actors Weaponizes Judicial Documents to Deliver PureHVNC RAT Threat Actors Weaponizes Judicial Documents to Deliver PureHVNC RAT Cyber Security News
Multiple Chrome High-Severity Vulnerabilities Let Attackers Execute Arbitrary Code Multiple Chrome High-Severity Vulnerabilities Let Attackers Execute Arbitrary Code Cyber Security News
Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections Cyber Security News
Critical Android 0-Click Vulnerability in System Component Allows RCE Attacks Critical Android 0-Click Vulnerability in System Component Allows RCE Attacks Cyber Security News
FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News