{"id":6877,"date":"2024-03-31T11:06:27","date_gmt":"2024-03-31T18:06:27","guid":{"rendered":"https:\/\/jasonsblog.ddns.net\/?p=6877"},"modified":"2024-03-31T11:10:29","modified_gmt":"2024-03-31T18:10:29","slug":"what-the-media-overlooks-in-xz-microsoft-staff-discovered-the-issue-in-a-microsoft-platform-just-in-time-to-distract-from-exchange-vulnerabilities","status":"publish","type":"post","link":"https:\/\/jasonsblog.ddns.net\/index.php\/2024\/03\/31\/what-the-media-overlooks-in-xz-microsoft-staff-discovered-the-issue-in-a-microsoft-platform-just-in-time-to-distract-from-exchange-vulnerabilities\/","title":{"rendered":"What the Media Overlooks in xz: Microsoft Staff &#8216;Discovered&#8217; the Issue in a Microsoft Platform Just in Time to Distract From Exchange Vulnerabilities"},"content":{"rendered":"\n<p>This is extremely interesting, in that this Linux SSH backdoor that was introduced through xz seems to have been reported by a Microsoft employee at just the perfect time to take heat away from Microsoft for a large percentage of Exchange servers that are unpatched against vulnerabilities as disclosed by Germany. Consequently, the xz SSH backdoor didn&#8217;t make it to many Linux versions, with many being development branches. In the case of Arch based distributions, they weren&#8217;t affected as the script and exploit mechanism only affected RPM and DEB based distributions that used the related library. But the German revelations about unpatched and out of service Exchange servers shows a major flaw with Microsoft&#8217;s business model and security support, where Linux is open source and receives much more support for a longer period of time, and since open source it can even be improved or extended through third parties or your own developers. So was this a sneaky marketing coverup? As they say with propaganda, don&#8217;t look here, look over there.<\/p>\n\n\n\n<p><a href=\"https:\/\/techrights.org\/n\/2024\/03\/31\/Microsoft-Exchange-chaos-the-real-news.shtml\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/techrights.org\/n\/2024\/03\/31\/Microsoft-Exchange-chaos-the-real-news.shtml<\/a><\/p>\n\n\n<div class=\"wp-block-ub-divider ub_divider ub-divider-orientation-horizontal\" id=\"ub_divider_a21b67b4-19d7-4a06-ae84-bcec0fb27a65\"><div class=\"ub_divider_wrapper\" style=\"position: relative; margin-bottom: 2px; width: 100%; height: 2px; \" data-divider-alignment=\"center\"><div class=\"ub_divider_line\" style=\"border-top: 2px solid #ccc; margin-top: 2px; \"><\/div><\/div><\/div>\n\n\n<p>By Roy Schestowitz<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">The <strong>more <u>important<\/u> news<\/strong> to watch today or this weekend: (it&#8217;s still largely unresolved and it enables blackmail, political\/industrial espionage, and <em>further<\/em> security breaches)<\/h5>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/techrights.org\/images\/2024\/Microsoft-Exchange-chaos-1.png\" alt=\"Microsoft Exchange chaos example\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/techrights.org\/images\/2024\/Microsoft-Exchange-chaos-2.png\" alt=\"Microsoft Exchange chaos example\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/techrights.org\/images\/2024\/Microsoft-Exchange-chaos-3.png\" alt=\"Microsoft Exchange chaos example\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/techrights.org\/images\/2024\/Microsoft-Exchange-chaos-4.png\" alt=\"Microsoft Exchange chaos example\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/techrights.org\/images\/2024\/Microsoft-Exchange-chaos-5.png\" alt=\"Microsoft Exchange chaos example\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/techrights.org\/images\/2024\/Microsoft-Exchange-chaos-6.png\" alt=\"Microsoft Exchange chaos example\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/techrights.org\/images\/2024\/Microsoft-Exchange-chaos-7.png\" alt=\"Microsoft Exchange chaos example\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/techrights.org\/images\/2024\/Microsoft-Exchange-chaos-8.png\" alt=\"Microsoft Exchange chaos example\"\/><\/figure>\n\n\n\n<p>For many of the above servers, it&#8217;s unequivocally a case of <strong>&#8220;too late&#8221;<\/strong>. The E-mails (and <em>beyond<\/em>) got copied by hostile actors and the consequences remain to be seen for <em>years<\/em> to come. This can cause suicides and cost billions of euros\/dollars in damages (over time).<\/p>\n\n\n\n<p>Oh, forget about that!<\/p>\n\n\n\n<p>Let&#8217;s talk about the version of <code>xz<\/code> that&#8217;s in Microsoft&#8217;s GitHub.<\/p>\n\n\n\n<p>Microsofters didn&#8217;t invent a logo and a brand name for it <em>this<\/em> time around?<\/p>\n\n\n\n<p>Well, we guess not. Or not <em>yet<\/em>.<\/p>\n\n\n\n<p>So <a href=\"https:\/\/techrights.org\/n\/2024\/03\/31\/Backdoor_in_xz_What_We_Know_So_Far.shtml\">earlier on<\/a> we made some remarks on the flaws that impacted mostly cutting-edge distros (which rush to adopt new and untested\/unaudited stuff). We saw that before with OpenSSL and similarly security-sensitive packages, which distros typically adopt just <em>months<\/em> later (maturity required). We wrote some articles about it in 2021, rebutting the scare-mongering and hype\/FUD. Microsofters played a big role in that FUD at the time. It happened again <a href=\"https:\/\/techrights.org\/o\/2022\/11\/01\/ibm-sensationalism\/\">a year later<\/a> (2022).<\/p>\n\n\n\n<p>Now it&#8217;s 2024. The facts <em>still<\/em> matter.<\/p>\n\n\n\n<p>The media mostly credits Red Hat (regarding <code>xz<\/code>), but Red Hat was merely a respondent, and Red Hat formally complained about words like &#8220;backdoor&#8221; or logos and brand names being leveraged to hype up holes like &#8220;heartbleed&#8221; (which did not actually cause much damage, it just caused damage to the perception\/image of Linux, owing to endless media hype that lasted many years).<\/p>\n\n\n\n<p>As we explained at the time, and <strong>many times<\/strong> in fact, Microsofters were responsible for this hype campaign (even if the original discovery came from a Google employee).<\/p>\n\n\n\n<p>So today it seems familiar. Why? Because <a href=\"http:\/\/news.tuxmachines.org\/n\/2024\/03\/29\/A_backdoor_in_xz.shtml\">the latest reports we&#8217;ve found<\/a> make it clear that the disclosure came from Microsoft staff at a very strategic time (see screenshots above).<\/p>\n\n\n\n<p>What Microsoft wants you <strong>not<\/strong> to notice (or resort to &#8220;whataboutism&#8221; when clients choose to move to GNU\/Linux) is the stuff at the top.<\/p>\n\n\n\n<p>Yes, Andres Freund works for Microsoft. It was not clear at first. He <a href=\"https:\/\/lwn.net\/ml\/oss-security\/20240329155126.kjjfduxw2yrlxgzm@awork3.anarazel.de\/\">used his <code>anarazel.de<\/code> email<\/a> instead of Microsoft email. Why?<\/p>\n\n\n\n<p>What a timing to disclose his &#8216;revelations&#8217; (a lot of this involves GitHub, not just systemd, which is led\/run by Microsoft staff).<\/p>\n\n\n\n<p>As noted above, Microsofters did the same with &#8220;heartbleed&#8221; over a decade ago. Because &#8220;Microsoft heart Linux&#8221;.<\/p>\n\n\n\n<p>So what <em>exactly<\/em> happened here? One can guess based on salient points of evidence.<\/p>\n\n\n\n<p>Stockpiling holes for <em>strategic<\/em> times?<\/p>\n\n\n\n<p>We debated this in length only a week ago in IRC because any time Microsoft has an epic security blunder the &#8220;Linux&#8221; news suddenly gets filled with FUD. And once again they&#8217;re bombarding all &#8220;Linux&#8221; related news with alarming security-themed headlines (not so unprecedented a pattern). The Friday\/Saturday news about &#8220;Linux&#8221; <a href=\"http:\/\/news.tuxmachines.org\/n\/2024\/03\/31\/Security_Scares_Around_Linux_Not_Even_Linux_s_Fault_in_Some_Cas.shtml\">looked like this<\/a>, and that&#8217;s aside from the above. Pseudonymous reporters, who could even be on Microsoft&#8217;s payroll, released some information about a hole just at the same time Microsoft had a lot of answering to do (and an emergency patch, which came far too late, as servers had already been breached, exposing perhaps trillions of emails, some of them very sensitive).<\/p>\n\n\n\n<p>We need answers here. For instance, how long has Microsoft&#8217;s Andres Freund known about this issue? Did someone give him a tip?<\/p>\n\n\n\n<p>This man is in the business of selling Windows, not Linux, and <a href=\"https:\/\/techrights.org\/wiki\/Microsoft_and_the_NSA\/\">at Microsoft security is never the objective<\/a>. It is just another &#8220;product&#8221; or &#8220;add-on&#8221;. <a href=\"https:\/\/techrights.org\/n\/2024\/03\/31\/Microsoft-Exchange-chaos-the-real-news.shtml#top\">\u2588<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is extremely interesting, in that this Linux SSH backdoor that was introduced through xz seems to have been reported by a Microsoft employee at just the perfect time to take heat away from Microsoft for a large percentage of Exchange servers that are unpatched against vulnerabilities as disclosed by Germany. Consequently, the xz SSH [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,7],"tags":[],"class_list":["post-6877","post","type-post","status-publish","format-standard","hentry","category-tech","category-world"],"blocksy_meta":[],"featured_image_src":null,"author_info":{"display_name":"Jason","author_link":"https:\/\/jasonsblog.ddns.net\/index.php\/author\/jturning\/"},"_links":{"self":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/6877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=6877"}],"version-history":[{"count":4,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/6877\/revisions"}],"predecessor-version":[{"id":6881,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/6877\/revisions\/6881"}],"wp:attachment":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=6877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=6877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=6877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}