Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year

Posted on August 13, 2025August 13, 2025 By CWS

The cybersecurity group continues to grapple with the lingering results of the XZ Utils backdoor, a complicated provide chain assault that shook the trade in March 2024.

What started as a rigorously orchestrated two-year marketing campaign by the pseudonymous developer ‘Jia Tan’ has advanced right into a persistent risk that extends far past its preliminary discovery.

The malicious actor methodically constructed credibility inside the XZ Utils challenge by quite a few reputable contributions earlier than inserting a fancy backdoor into the xz-utils packages, affecting main Linux distributions together with Debian, Fedora, and OpenSUSE.

The backdoor operates by a complicated mechanism embedded inside the liblzma.so library, which interfaces straight with OpenSSH servers.

When triggered by consumer interactions with contaminated SSH servers, the malicious code establishes three vital hooks focusing on the RSA_public_decrypt, RSA_get0_key, and EVP_PKEY_set1_RSA features.

This intricate assault chain begins with modified IFUNC resolvers for lzma_crc32 and lzma_crc64 features, making a pathway for backdoor performance that remained undetected for months.

Latest investigations by Binarly researchers have revealed that the XZ Utils backdoor continues to pose important dangers to containerized environments greater than a 12 months after its preliminary discovery.

Their complete evaluation of Docker Hub repositories has uncovered over 35 contaminated pictures, with 12 Debian-based containers nonetheless publicly obtainable and actively distributing the compromised code.

This discovery highlights a vital blind spot in container safety, the place historic artifacts containing recognized vulnerabilities persist in public repositories.

The analysis group’s findings lengthen past first-generation contaminated pictures. By means of systematic scanning of Docker Hub’s intensive repository community, Binarly analysts recognized quite a few second-order containers constructed upon the compromised Debian base pictures.

Response from the Debian maintainer to our disclosure (Supply – Binarly)

These by-product containers, spanning numerous use circumstances from growth environments to specialised purposes, show how provide chain compromises can propagate by containerized ecosystems with minimal visibility.

Persistence and Propagation Mechanisms

The backdoor’s persistence inside Docker environments reveals a basic problem in container safety lifecycle administration. Not like conventional software program updates that may be systematically patched, container pictures typically stay static historic artifacts as soon as revealed.

The malicious code embedded in these containers maintains its performance by the liblzma.so library’s integration with system processes, making certain that any SSH server operating inside an contaminated container turns into a possible assault vector.

The technical implementation leverages IFUNC resolver modifications that redirect normal compression operate calls by malicious handlers.

When the container initializes SSH providers, the backdoor establishes its hooks inside the sshd course of context, creating persistent entry channels that bypass conventional safety monitoring.

This method demonstrates the attacker’s deep understanding of each containerization applied sciences and system-level Linux operations, making detection significantly difficult for organizations relying solely on surface-level vulnerability scanning instruments.

Increase your SOC and assist your group defend your small business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Backdoor, Docker, Images, Infamous, Planted, Year

Post navigation

Previous Post: Key Capabilities Security Leaders Need to Know
Next Post: Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code

Related Posts

Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered Cyber Security News
Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution Cyber Security News
Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges Cyber Security News
Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns Cyber Security News
Chrome Emergency Update to Patch Multiple Vulnerabilities that Enable Remote Code Execution Cyber Security News
Role of Threat Intelligence in Proactive Defense Strategies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark