{"id":77960,"date":"2024-04-26T12:26:02","date_gmt":"2024-04-26T04:26:02","guid":{"rendered":"https:\/\/version-2.com\/?p=77960"},"modified":"2024-09-25T17:46:05","modified_gmt":"2024-09-25T09:46:05","slug":"how-linux-almost-had-a-terrible-horrible-no-good-very-bad-day","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/04\/how-linux-almost-had-a-terrible-horrible-no-good-very-bad-day\/","title":{"rendered":"How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"77960\" class=\"elementor elementor-77960\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/xzBlogImage.png.webp\" width=\"1200\" height=\"628\" \/><\/p><div class=\"fl-module-content fl-node-content\"><h2><strong>How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day<\/strong><\/h2><p>If there\u2019s one thing you can say about the people behind the xz supply chain hack, they were certainly willing to play a long con. \u00a0\u00a0 For the last two years, a (probable) state-sponsored hacker quietly began integrating themselves into the open source community, particularly with the people responsible for maintaining xz utils (more on what this is and what it does in a minute.)\u00a0 They began systematically inserting a back door into this core component of the Linux operating system that would have allowed attackers to bypass SSH authentication and remotely access millions of systems.\u00a0 We were just days away from the biggest <a href=\"https:\/\/www.portnox.com\/cybersecurity-101\/supply-chain-attack\/\">supply chain attack<\/a> in history when they were caught.<\/p><h4><strong>What is XZ Utils?<\/strong><\/h4><p>Xz Utils is a program that handles file compression, and it is included as part of several popular Linux distros like Fedora, Debian, and Ubuntu.\u00a0 There is even a Windows version, although Windows software is usually a zip file rather than an xz file.\u00a0 \u00a0 Programs like this are crucial because large downloads like software packages need to be compressed, or they would take forever to download even with the highest internet speed.<\/p><p>\u00a0<\/p><h4><strong>Open Source, Open to All<\/strong><\/h4><p>To understand how we came so close to disaster, you first have to understand how <a href=\"https:\/\/www.synopsys.com\/glossary\/what-is-open-source-software.html#B\">open source<\/a> software works.\u00a0 Open source means that the source code \u2013 the building blocks of the software \u2013 is available for anyone to see and modify. \u00a0 Open source software is like <a href=\"https:\/\/www.amazon.com\/LEGO-Building-Featuring-Airplane-Passionate\/dp\/B09JKXG8TY\/ref=sr_1_16?crid=2FVLR35RG5C0A&amp;dib=eyJ2IjoiMSJ9.mivOyMI-VPWO84C8Yl5_VtHihdWobtqzkbNt7zSJTOXIYn2AzB6yKcmWN21HZfiJrJDp0FBJvy3fg0C3oImgOaVIMjbFAVmItAdC7ZG07Ulg6fJa5BXycrCSO3dtUjQUTvfTkgaVhL4hpUbJdFy481siP-GbspuMeWErQ6c5HbHbR2qbibChLx_cXFJUCtRNUa_bIi8ZUSypCIDf0IYwA3-E6hOLbEWR9_qKcJ3iOxd9en5RN74gUqqgU59s16c2Rriih3eTqGGdLEl96QwWvGQGIPSPcXJ7TyhOVAXNgfo.in5bp9yIuvf5Ehu10Om4mcnl0p4vLgRmyKZ7LPwFI4c&amp;dib_tag=se&amp;keywords=lego+kit&amp;qid=1712855669&amp;sprefix=leggo+kit,aps,103&amp;sr=8-16\">buying a box of legos<\/a> \u2013 sure, you can make the robot on the outside of the box, but you can also modify and invent whatever you want.\u00a0 The same applies to open source software \u2013 if you have the requisite programming knowledge, you can contribute bug fixes, work on features, and shape the future of the programs you use every day.\u00a0 Software like Microsoft Windows and macOS are closed source (although macOS runs on FreeBSD, which is open source, but the user interface and applications are closed source.) With these operating systems, you\u2019re at the mercy of Microsoft and Apple to fix bugs, and as we all know, they often don\u2019t (just take a <a href=\"https:\/\/thenewstack.io\/the-44-year-old-operating-system-bug\/\">look at this 40+-year-old bug<\/a> someone found in Windows in 2018!)\u00a0 The huge advantage of using an open source OS like Linux is that if you have a bug or a feature request that you want to be implemented, you can just do it yourself. \u00a0\u00a0 Of course, just because anyone can technically contribute, does not mean there is just software anarchy.\u00a0 According to The Linux Foundation, most <a href=\"https:\/\/www.linuxfoundation.org\/resources\/open-source-guides\/participating-in-open-source-communities\">projects have a structure<\/a>:<\/p><ul><li><strong>Leaders<\/strong><\/li><\/ul><ul><li>Someone responsible for making the final decisions about features, releases, and other priorities<\/li><\/ul><ul><li><strong>Maintainers<\/strong><\/li><\/ul><ul><li>These people are leaders for specific areas or features; for instance, there is a documentation leader, a leader for developing device drivers, USB, etc. etc.\u00a0 They are responsible for reviewing code from others before it gets added to their individual area.<\/li><\/ul><ul><li><strong>Committers<\/strong><\/li><\/ul><ul><li>Trusted developers who have done enough work for the project that they can make direct code changes rather than be subject to reviews by the maintainers.<\/li><\/ul><ul><li><strong>Contributors<\/strong><\/li><\/ul><ul><li>Anyone who contributes, be it code, documentation, or what have you.\u00a0 Their contributions are reviewed by the maintainer(s) before they\u2019re added to the project.<\/li><\/ul><p>\u00a0<\/p><h4><strong>Foxes in the Hen House<\/strong><\/h4><p>In 2021, someone with the user name JiaT75 opened a GitHub account and made their first commit to an open source project.\u00a0 They claimed it was <a href=\"https:\/\/github.com\/libarchive\/libarchive\/pull\/1609\">just adding clearer error text<\/a> when an untaring (aka uncompressing) process failed; at the time, it was added without comment, but in retrospect, it appears suspicious.\u00a0 These changes have since been reverted. In April of 2022, Jia Tan (aka JiaT75) submitted a patch to Xz via the mailing list.\u00a0 Around the same time, two people began badgering the maintainer of Xz to add another maintainer because patches were not happening fast or often enough.\u00a0 Neither of these people had any history in the open source community, and after these messages they were never seen again.\u00a0 Over the course of 2022, JiaT75 becomes the second most active contributor to the xz project.\u00a0 In January of 2023 JiaT75 merges their first direct code change, which means they have now achieved a level of trust that allows them to implement the code for the back door.\u00a0 Over the course of 2023, changes were regularly made as JiaT75 implemented the back door one piece at a time.\u00a0 In February of 2024, the last few files were completed.\u00a0 \u00a0\u00a0 While this was happening, the hacker was contacting the leads of all the major Linux distributions to get them to install the updated version of xz utils.\u00a0 Richard WM Jones from Redhat <a href=\"https:\/\/news.ycombinator.com\/item?id=39866275\">wrote about his contact with the hacker<\/a> and Redhat\u2019s scramble to remove the backdoor once they found it, and Ubuntu has also made public <a href=\"https:\/\/bugs.launchpad.net\/ubuntu\/+source\/xz-utils\/+bug\/2059417\">the post from Jia Tan<\/a> asking them to include it.\u00a0 This is an overview of the timeline, you can find an excellent detailed version with links to the GitHub submissions and e-mails <a href=\"https:\/\/boehs.org\/node\/everything-i-know-about-the-xz-backdoor\">here<\/a>.\u00a0 \u00a0 <strong>An Unlikely Discovery<\/strong>\u00a0 With all the careful measures taken to make this look legit, how did they get caught?\u00a0 Purely by a stroke of luck. Andres Freund, a developer working at Microsoft, was <a href=\"https:\/\/mastodon.social\/@AndresFreundTec\/112180406142695845\">troubleshooting a performance issue<\/a> on a Debian Linux system.\u00a0 When you remember that no stable version of Debian was released with the vulnerability, and therefore he was working on an experimental version, the sheer luck behind this discovery is astounding.\u00a0 He noticed that SSH logins were using too much CPU and recalled an error he had seen in <a href=\"https:\/\/valgrind.org\/\">Valgrind<\/a> (a program used to monitor computer memory), so he put the pieces together.\u00a0 Thanks to his keen eye and serious investigative skills, he traced the problem to xz utils and <a href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2024\/03\/29\/4\">sent a missive<\/a> to the Open Source Security List to describe the problem. \u00a0\u00a0 Most people never dig this deep into performance issues, and even if they do, it takes a lot of system knowledge to be able to trace them to the specific cause the way Freund did.<\/p><h4>\u00a0<\/h4><h4><strong>We\u2019re Safe Now, Right?\u2026..Right?<\/strong><\/h4><p>Supply chain attacks are obviously not limited to open source software. After all, the reason <a href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/stopping-a-supply-chain-attack\/\">most people know the term \u201cSupply chain attack\u201d<\/a> is because of SolarWinds in 2020, which was most certainly not open source.\u00a0 But still, this shows that open source software may be more vulnerable than others.\u00a0 When the fake accounts began badgering Lasse Collin about lack of updates,\u00a0 <a href=\"https:\/\/www.mail-archive.com\/xz-devel@tukaani.org\/msg00567.html\">his response showed<\/a> that the open source developers are subject to limited time, burnout, and other struggles just like closed source developers, and adding this on top of the fact that open source development is not paid, well\u2026it\u2019s easy to see how someone could make themselves popular very quickly, and how maybe new code is not always tested as thoroughly as it should be.\u00a0 Again, this definitely isn\u2019t a problem specific to open source, but it\u2019s perhaps easier to exploit. \u00a0Regardless of the development method, we need to ramp up supply chain security across the board before the next attack is successful.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>How Linux (Almost) Had a Terrible, Horrible, No Good, V [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,424,61],"tags":[352,423,1272],"class_list":["post-77960","post","type-post","status-publish","format-standard","hentry","category-1273","category-portnox","category-press-release","tag-network","tag-portnox","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day - Version 2\" \/>\n<meta property=\"og:description\" content=\"How Linux (Almost) Had a Terrible, Horrible, No Good, V [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T04:26:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-25T09:46:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/xzBlogImage.png.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/xz-supply-chain-hack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/how-linux-almost-had-a-terrible-horrible-no-good-very-bad-day\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day\",\"datePublished\":\"2024-04-26T04:26:02+00:00\",\"dateModified\":\"2024-09-25T09:46:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/how-linux-almost-had-a-terrible-horrible-no-good-very-bad-day\\\/\"},\"wordCount\":1193,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/xz-supply-chain-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/04\\\/xzBlogImage.png.webp\",\"keywords\":[\"Network\",\"Portnox\",\"2024\"],\"articleSection\":[\"2024\",\"Portnox\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/04\\\/how-linux-almost-had-a-terrible-horrible-no-good-very-bad-day\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/xz-supply-chain-hack\\\/\",\"name\":\"How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/xz-supply-chain-hack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/xz-supply-chain-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/04\\\/xzBlogImage.png.webp\",\"datePublished\":\"2024-04-26T04:26:02+00:00\",\"dateModified\":\"2024-09-25T09:46:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/xz-supply-chain-hack\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/xz-supply-chain-hack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/xz-supply-chain-hack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/04\\\/xzBlogImage.png.webp\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/04\\\/xzBlogImage.png.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/xz-supply-chain-hack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/","og_locale":"zh_HK","og_type":"article","og_title":"How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day - Version 2","og_description":"How Linux (Almost) Had a Terrible, Horrible, No Good, V [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/","og_site_name":"Version 2","article_published_time":"2024-04-26T04:26:02+00:00","article_modified_time":"2024-09-25T09:46:05+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/xzBlogImage.png.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/04\/how-linux-almost-had-a-terrible-horrible-no-good-very-bad-day\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day","datePublished":"2024-04-26T04:26:02+00:00","dateModified":"2024-09-25T09:46:05+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/04\/how-linux-almost-had-a-terrible-horrible-no-good-very-bad-day\/"},"wordCount":1193,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/xzBlogImage.png.webp","keywords":["Network","Portnox","2024"],"articleSection":["2024","Portnox","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/04\/how-linux-almost-had-a-terrible-horrible-no-good-very-bad-day\/","url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/","name":"How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/xzBlogImage.png.webp","datePublished":"2024-04-26T04:26:02+00:00","dateModified":"2024-09-25T09:46:05+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/xzBlogImage.png.webp","contentUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/04\/xzBlogImage.png.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/xz-supply-chain-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How Linux (Almost) Had a Terrible, Horrible, No Good, Very Bad Day"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-khq","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/77960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=77960"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/77960\/revisions"}],"predecessor-version":[{"id":77964,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/77960\/revisions\/77964"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=77960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=77960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=77960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}