Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year

Posted on August 13, 2025August 13, 2025 By CWS

The cybersecurity group continues to grapple with the lingering results of the XZ Utils backdoor, a complicated provide chain assault that shook the trade in March 2024.

What started as a rigorously orchestrated two-year marketing campaign by the pseudonymous developer ‘Jia Tan’ has advanced right into a persistent risk that extends far past its preliminary discovery.

The malicious actor methodically constructed credibility inside the XZ Utils challenge by quite a few reputable contributions earlier than inserting a fancy backdoor into the xz-utils packages, affecting main Linux distributions together with Debian, Fedora, and OpenSUSE.

The backdoor operates by a complicated mechanism embedded inside the liblzma.so library, which interfaces straight with OpenSSH servers.

When triggered by consumer interactions with contaminated SSH servers, the malicious code establishes three vital hooks focusing on the RSA_public_decrypt, RSA_get0_key, and EVP_PKEY_set1_RSA features.

This intricate assault chain begins with modified IFUNC resolvers for lzma_crc32 and lzma_crc64 features, making a pathway for backdoor performance that remained undetected for months.

Latest investigations by Binarly researchers have revealed that the XZ Utils backdoor continues to pose important dangers to containerized environments greater than a 12 months after its preliminary discovery.

Their complete evaluation of Docker Hub repositories has uncovered over 35 contaminated pictures, with 12 Debian-based containers nonetheless publicly obtainable and actively distributing the compromised code.

This discovery highlights a vital blind spot in container safety, the place historic artifacts containing recognized vulnerabilities persist in public repositories.

The analysis group’s findings lengthen past first-generation contaminated pictures. By means of systematic scanning of Docker Hub’s intensive repository community, Binarly analysts recognized quite a few second-order containers constructed upon the compromised Debian base pictures.

Response from the Debian maintainer to our disclosure (Supply – Binarly)

These by-product containers, spanning numerous use circumstances from growth environments to specialised purposes, show how provide chain compromises can propagate by containerized ecosystems with minimal visibility.

Persistence and Propagation Mechanisms

The backdoor’s persistence inside Docker environments reveals a basic problem in container safety lifecycle administration. Not like conventional software program updates that may be systematically patched, container pictures typically stay static historic artifacts as soon as revealed.

The malicious code embedded in these containers maintains its performance by the liblzma.so library’s integration with system processes, making certain that any SSH server operating inside an contaminated container turns into a possible assault vector.

The technical implementation leverages IFUNC resolver modifications that redirect normal compression operate calls by malicious handlers.

When the container initializes SSH providers, the backdoor establishes its hooks inside the sshd course of context, creating persistent entry channels that bypass conventional safety monitoring.

This method demonstrates the attacker’s deep understanding of each containerization applied sciences and system-level Linux operations, making detection significantly difficult for organizations relying solely on surface-level vulnerability scanning instruments.

Increase your SOC and assist your group defend your small business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Backdoor, Docker, Images, Infamous, Planted, Year

Post navigation

Previous Post: Key Capabilities Security Leaders Need to Know
Next Post: Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code

Related Posts

10 Best API Monitoring Tools in 2025 Cyber Security News
Anthropic’s MCP Server Vulnerability Let Attackers Escape Server’s Sandbox and Execute Arbitrary Code Cyber Security News
Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number Cyber Security News
DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots Cyber Security News
Identity and Access Management Trends Shaping 2025 Cyber Security News
Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog
  • Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network
  • GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise
  • Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation
  • How to Secure Your GitHub Repositories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog
  • Microsoft Exchange Server Vulnerabilities Let Attackers Spoof and Tamper Over Network
  • GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise
  • Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation
  • How to Secure Your GitHub Repositories

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News