📰 Linux XZ Utils Backdoor Attribution Analysis

Поделиться
HTML-код
  • Опубликовано: 28 авг 2024
  • 🚨 ALERT: * Linux Backdoored XZ Utils (xz-utils)* How This Was Pulled Off, And Who May Have Done It? This Was A Backdoor In Layers - Many Changes Of Lesser Alarm, Together, Critical Remote Access, Compromised SSHD, Risking Countless Linux Servers / Computers Worldwide.
    I'm Leaning Towards Nation-State Actors Theory (group carrying out multiple tasks), And Share My Analysis Today On This Vital FOSS Story.
    SHARE THIS ON SOCIAL MEDIA TO SUPPORT CHANNEL
    Bringing you 100% independent content, aiming to introduce to you the most honest, unfiltered security & privacy content on the net. Hopefully youtube / google will recognize it, and help this channel grow!
    Thanks for sharing this and all videos. It's a HUGE help reposting these videos!
    SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW
    SHARE YOUR THEORY / THOUGHTS IN COMMENTS
    Join me today in this. Leave a comment, share a thought.
    EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org
    (VIDEO SHARED EARLY ON PUBLIC BLOG: bmc.link/polit...)
    Watch, And Share With Others!
    #Linux #cyber #xz
    I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.
    If you learn something here, consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)
    💎 THANK YOU FOR CONSIDERING SUPPORTING THIS CHANNEL
    💻 LAPTOP (coreboot / Intel ME neutered): bmc.link/polit... (options)
    MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
    CASHAPP - cash.app/$Huma...
    MEMBERSHIP: bmc.link/polit... (early / exclusive / more)
    SUPPORT OPTIONS (LIST): bmc.link/polit...
    *PUBLIC BLOG:* bmc.link/polit...
    First shared on public blog: buymeacoffee.c... (follow blog for free and / or optionally support this work)
    📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com
    📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)

Комментарии • 19

  • @AVAM..
    @AVAM.. 4 месяца назад +1

    It also shows, monitoring unusual processor levels in diverse conditions for detecting backdoors and trojans must be a standard and automatized way of testing!

    • @RTPTechTips
      @RTPTechTips  4 месяца назад

      This is a good idea. I had similar thoughts when making this video, thanks for your comment!

  • @robyee3325
    @robyee3325 4 месяца назад +1

    18:18 that’s crazy. Spot on man!

  • @Hasblock
    @Hasblock 4 месяца назад +1

    Intelligent guy. Just stumbled upon this video. It was good to see someone not just default to saying it was China but also not leaving out that possibility due to the varying layers of subterfuge possible in this kinds of plots. Gotta sub for great content like this

    • @RTPTechTips
      @RTPTechTips  4 месяца назад

      Appreciate your support on this! Might make a follow up if I find new information. Thank you for the great feedback and thanks for the sub. :)

  • @robyee3325
    @robyee3325 4 месяца назад +1

    Great breakdown

    • @RTPTechTips
      @RTPTechTips  4 месяца назад +1

      Thank you. Your feedback is much appreciated Rob!

  • @ThomasKundera
    @ThomasKundera 4 месяца назад

    Even if low probability, you cannot discard the hypothesis that NSA was involved.
    But all others you mentioned look more likely.
    In any case, I agree it's a state-sponsored operation.
    And pretty worrying.

    • @RTPTechTips
      @RTPTechTips  4 месяца назад +1

      I certainly haven't discarded that possibility. 😉 And it does make one wonder, what might have slipped by? 🤔

    • @ThomasKundera
      @ThomasKundera 4 месяца назад

      @@RTPTechTips : That discover was so by chance...
      There might be 3 exploits of same level of complexity that are everywhere but unnoticed...
      Yeah, we can wonder...

  • @Edward-pw6zz
    @Edward-pw6zz 4 месяца назад

    Thank you for the excellent coverage!

    • @RTPTechTips
      @RTPTechTips  4 месяца назад

      Hey thanks for watching Ed! Appreciate your support of the channel / feedback.

  • @robyee3325
    @robyee3325 4 месяца назад +1

    13:00 I agree those were fake comments to get him stressed out and probably fake comments praising villain to make him look reliable in the fake bot community so he felt okay giving it over

    • @RTPTechTips
      @RTPTechTips  4 месяца назад

      100%. I find it hard to believe they weren't involved. Just goes to show the lengths groups will go to, to achieve objectives.

  • @Andrew-qhaf2
    @Andrew-qhaf2 4 месяца назад

    They are afraid of the year of the linux desktop and linux becoming more popular then Windows and macOS.

    • @RTPTechTips
      @RTPTechTips  4 месяца назад

      As in psychological operations, persuade, change, influence. If you can't beat them, infiltrate them. ;)

  • @Andrew-xk6hr
    @Andrew-xk6hr 4 месяца назад +1

    Microsoft has put back doors all over linux.

    • @RTPTechTips
      @RTPTechTips  4 месяца назад +1

      They are just keeping it, (as windows says under machine info) "This System Monitored and protected". 😛

    • @LeapFrog_Radio
      @LeapFrog_Radio 3 месяца назад

      Embrace, Extend, Extinguish.