Thought this was a good read exploring some how the “how and why” including several apparent sock puppet accounts that convinced the original dev (Lasse Collin) to hand over the baton.

  • Dessalines@lemmy.ml
    link
    fedilink
    arrow-up
    47
    arrow-down
    5
    ·
    9 months ago

    Any speculations on the target(s) of the attack? With stuxnet the US and Israel were willing to to infect the the whole world to target a few nuclear centrifuges in Iran.

    • Karna@lemmy.ml
      link
      fedilink
      arrow-up
      25
      ·
      9 months ago

      Definitely state sponsored attack. It could be any nation - US to North Korea, and any other nation in between.

      • khannie@lemmy.world
        link
        fedilink
        English
        arrow-up
        18
        ·
        9 months ago

        There is some indication based on commit times and the VPN used that it’s somewhere in Asia. Really interesting detail in this write up.

        The timezone bit is near the end iirc.

        • GamingChairModel@lemmy.world
          link
          fedilink
          arrow-up
          8
          arrow-down
          2
          ·
          9 months ago

          Good writeup.

          The use of ephemeral third party accounts to “vouch” for the maintainer seems like one of those things that isn’t easy to catch in the moment (when an account is new, it’s hard to distinguish between a new account that will be used going forward versus an alt account created for just one purpose), but leaves a paper trail for an audit at any given time.

          I would think that Western state sponsored hackers would be a little more careful about leaving that trail of crumbs that becomes obvious in an after-the-fact investigation. So that would seem to weigh against Western governments being behind this.

          Also, the last bit about all three names seeming like three different systems of Romanization of three different dialects of Chinese is curious. If it is a mistake (and I don’t know enough about Chinese to know whether having three different dialects in the same name is completely implausible), that would seem to suggest that the sponsors behind the attack aren’t that familiar with Chinese names (which weighs against the Chinese government being behind it).

          Interesting stuff, lots of unanswered questions still.

          • 0xD@infosec.pub
            link
            fedilink
            arrow-up
            2
            ·
            9 months ago

            What is the trail of crumbs? Just some random email accounts?

            This was in a big part a social engineering attack, so you can’t really avoid contact.

    • Jennykichu@lemmy.dbzer0.comOP
      link
      fedilink
      arrow-up
      27
      arrow-down
      2
      ·
      9 months ago

      Stuxnet was an extremely focused attack, targeting specific software on specific PLCs in a specific way to prevent them mixing up nuclear batter into a boom boom cake. Even if it managed to affect the whole world, it would be a laser compared to this wide-net.

    • SpaceCowboy@lemmy.ca
      link
      fedilink
      arrow-up
      13
      arrow-down
      2
      ·
      9 months ago

      Given how low level it is and the timespan involved, there probably wasn’t a specific use in mind. Just adding capability for a future attack to be determined later.

    • TheAnonymouseJoker@lemmy.ml
      link
      fedilink
      arrow-up
      16
      arrow-down
      7
      ·
      9 months ago

      My guesses wildly range on this topic.

      • Facebook probably wanted Zstd adoption over XZ/LZMA
      • There was probably an analysis of who uses LZMA compression a lot, and it so happens that archivists, pirates, people and countries with low bandwidth speeds, people in Russia, game repackers et al use it a lot compared to “good law abiding” money blinded consumers of rich countries
      • Somebody wanted to screw over LZMA/XZ/7Z users
      • (most favourite right now) implanting a network backdoor into Linux servers and ecosystems
      • Someone thought it would be a good idea to troll open source community and make it look worse than closed source, so that closed source security can be popularised (“security” trolls in FOSS community I harp about love such ideas, beware of any Graphene/Chrome/Apple and Big Tech lovers just as example)
      • Tying into the idea of making FOSS ecosystem look bad, it might be a concerted effort by closed source company/companies to propel themselves above, as FOSS development is shitting on closed source corporate model
      • A different approach, it could be the first step in a series of steps to dismantle FOSS ecosystem, considering how much trust and transparency it has that attracts everyone enlightened enough

      I could think of many other scenarios and outcomes if I put enough time, but I think this should be enough food for thought. The beneficiaries are limited, the actors few, and the methods cannot vary too much.

      • forgotmylastusername@lemmy.ml
        link
        fedilink
        arrow-up
        9
        ·
        edit-2
        9 months ago

        The world needed the open internet to bootstrap the digital revolution. It wasn’t possible without the sum of humanity working altruistically to build the Library of Alexandria of software. No private entity could have possibly done it. It truly is an under appreciated marvel of the late-20th/early-21st century. FOSS contains the knowledge of software that runs the world. Now that such a thing exists I could totally see organizations (loosely speaking) wanting to conquer or ransack it. It’s quite clear by now there’s faction of tech with a tyrannical bent. I’d put them whoever they might be exactly as possible culprits.

        • Murdoc@sh.itjust.works
          link
          fedilink
          arrow-up
          3
          ·
          9 months ago

          Funny coincidence for me, but I just learned this listening to a podcast called Behind the Bastards: The Ballad of Bill Gates. It talked about how one of the reasons MS became so big was because so many people shared MS BASIC back in the day, but then Gates worked so hard against piracy afterwards despite that fact. So basically just one aspect of what you are talking about.

      • Supermariofan67@programming.dev
        link
        fedilink
        arrow-up
        7
        ·
        edit-2
        9 months ago

        The first 3 seem incredibly far-fetched.

        • What exactly does Facebook gain from more people using zstd, other than more contributions and improvement to zstd and the ecosystem (i.e. the reason corporations are willing to open source stuff).
        • Why do you consider zlma to be loved among pirates and hackers and zstd not to be, when zstd is incredibly popular and well-loved in the FOSS community and compresses about as well as lzma?
        • Every person in the world uses both lzma and zstd extensively, even if indirectly without them realizing it.

        I think it’s likey that, of all the mainstream compression formats, lzma was the least audited (after all, it was being maintained by one overworked person). Zstd has lots of eyes on it from Google and Facebook, all of the most talented experts in the world on data compression contributing to it, and lots of contributors. Zlib has lots of forks and overall probably more attention than lzma. Bz2 is rarely used anymore. So that leaves lzma

        • TheAnonymouseJoker@lemmy.ml
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          9 months ago

          Cloudflare deploys Zstd, and many web servers and CDNs use it. Endless possibilities for Facebook and US gov. They can put Yann Collet out of the way or gag order him.

          LZMA is the highest compression algorithm outside of PAQ and SuperRep+LOLZ, while being magnitudes faster than both. Zstd compression ratio is a joke and is only good for webpage asset loading times.

          • Supermariofan67@programming.dev
            link
            fedilink
            arrow-up
            4
            ·
            9 months ago

            Facebook may be evil but I don’t think they’re anywhere near “inject malware into global supply chains to push adoption of a public engineering side project that they don’t directly profit from and most executives don’t care about” level of evil. Is it possible? Sure anything is possible, but that is wildly beyond many many more plausible explanations and there’s zero evidence leading us down this path. And why would they go through the trouble of backdooring zstd, which has a highly observed codebase, when they just successfully backdoored lzma because it didn’t have a lot of maintainers?

            While it’s true that zstd is commonly favored for having “good” compression at blazingly fast speeds, which is useful on the web and on servers, Zstd 's max compression setting (zstd --long -19) is actually within about 5% of LZMA’s but faster, so it replaces most use cases of LZMA except when that extra 5% (and that’s not even constant; some inputs are even better on zstd) really does matter at all speed cost

            • TheAnonymouseJoker@lemmy.ml
              link
              fedilink
              arrow-up
              2
              arrow-down
              1
              ·
              9 months ago

              I have extensively benchmarked Zstd and it is a joke compared to LZMA2 when it comes to compression ratio. And not even that, the lack of features Zstd has, that 7Z does have, makes it a far bigger joke. 7Z is a feature complete archival solution unlike Zstd, with possible options for archive repair. RAR is far superior for that bitrot resistance.

              The amount of possibilities Facebook and US gov get with backdooring XZ are endless, since it could destroy trust in it if uncaught, and Zstd adoption meant web malware deployment could become a matter of when, because Facebook already does it right now with actual malware JS scripts through fbcdn domain.

      • Murdoc@sh.itjust.works
        link
        fedilink
        arrow-up
        4
        ·
        9 months ago
        • Someone thought it would be a good idea to troll open source community and make it look worse than closed source, so that closed source security can be popularised (“security” trolls in FOSS community I harp about love such ideas, beware of any Graphene/Chrome/Apple and Big Tech lovers just as example)
        • Tying into the idea of making FOSS ecosystem look bad, it might be a concerted effort by closed source company/companies to propel themselves above, as FOSS development is shitting on closed source corporate model
        • A different approach, it could be the first step in a series of steps to dismantle FOSS ecosystem, considering how much trust and transparency it has that attracts everyone enlightened enough

        This is why it surprised me to learn that this was noticed/announced by an MS employee.

    • RegalPotoo@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      3
      ·
      9 months ago

      I’d be super surprised if this was western intelligence. Stuxnet escaping Natanz was an accident, and there is no way that an operation like this would get approved by the NSAs Vulnerabilities Equities Process.

      My money would be MSS or GRU. Outside chance this is North Korean, but doesn’t really feel like their MO