Thought this was a good read exploring some how the “how and why” including several apparent sock puppet accounts that convinced the original dev (Lasse Collin) to hand over the baton.

    • Kindness@lemmy.ml
      link
      fedilink
      arrow-up
      99
      arrow-down
      2
      ·
      9 months ago

      Imagine finding a backdoor within 45 day of it’s release into a supply chain instead of months after infection. This is a most astoundingly rapid discovery.

      Fedora 41 and rawhide, Arch, a few testing and unstable debian distributions and some apps like HomeBrew were affected. Not including Microsoft and other corporations who don’t disclose their stack.

      What a time to be alive.

      • flying_sheep@lemmy.ml
        link
        fedilink
        arrow-up
        22
        ·
        9 months ago

        Arch was never affected, as described in their news post about it. Arch users had malicious code on their hard disks, but not the part that would have called into it.

      • SpaceCowboy@lemmy.ca
        link
        fedilink
        arrow-up
        20
        arrow-down
        3
        ·
        9 months ago

        Before resting on our laurels, we should consider it’s possible it’s more widespread but just not being disclosed until after it’s patched.

        It would be wise to be on the lookout for security patches for the next few days.

      • Lemmchen@feddit.de
        link
        fedilink
        arrow-up
        10
        ·
        9 months ago

        Consider this the exception to the rule. There’s no reason we should assume this timeline is the norm.

        • Kindness@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          9 months ago

          True. Though remarkable is still remarkable.

          Notably, the timeline post-discovery is still stellar, regardless of Microsoft/GitHub cock-blocking analysis.

    • LiveLM@lemmy.zip
      link
      fedilink
      English
      arrow-up
      54
      arrow-down
      1
      ·
      edit-2
      9 months ago

      Disguising the virus as a corrupted test file then ‘uncorrupting’ it is crazy