Thought this was a good read exploring some how the “how and why” including several apparent sock puppet accounts that convinced the original dev (Lasse Collin) to hand over the baton.
Thought this was a good read exploring some how the “how and why” including several apparent sock puppet accounts that convinced the original dev (Lasse Collin) to hand over the baton.
Source: https://infosec.exchange/@fr0gger/112189232773640259
Imagine finding a backdoor within 45 day of it’s release into a supply chain instead of months after infection. This is a most astoundingly rapid discovery.
Fedora 41 and rawhide, Arch, a few testing and unstable debian distributions and some apps like HomeBrew were affected. Not including Microsoft and other corporations who don’t disclose their stack.
What a time to be alive.
Source: https://turnoff.us/
Before resting on our laurels, we should consider it’s possible it’s more widespread but just not being disclosed until after it’s patched.
It would be wise to be on the lookout for security patches for the next few days.
Consider this the exception to the rule. There’s no reason we should assume this timeline is the norm.
True. Though remarkable is still remarkable.
Notably, the timeline post-discovery is still stellar, regardless of Microsoft/GitHub cock-blocking analysis.
Arch was never affected, as described in their news post about it. Arch users had malicious code on their hard disks, but not the part that would have called into it.
Disguising the virus as a corrupted test file then uncorrupting is crazy