On March 29, 2024, Andres Freund — a Microsoft engineer working on PostgreSQL — noticed something strange. SSH logins on his Debian testing system were taking about 500 milliseconds longer than expected. That curiosity led him to investigate, and what he found sent shockwaves through the open source community: a sophisticated backdoor had been deliberately inserted into XZ Utils, a compression library used by virtually every Linux distribution.
The long game
Unlike most supply chain attacks that exploit technical vulnerabilities, the XZ Utils backdoor was the product of social engineering executed over multiple years. The attacker, operating under the identity “Jia Tan,” began contributing to the XZ Utils project in 2021 — submitting legitimate, helpful patches and building trust with the sole maintainer.
CVE-2024-3094 was assigned a CVSS score of 10.0 (Critical). The backdoor was caught just before reaching stable Linux distribution channels — a near-miss with potentially catastrophic consequences.
By 2022, sockpuppet accounts began pressuring the overworked maintainer — complaining about slow review times and suggesting that new co-maintainers were needed. This social pressure, combined with Jia Tan’s track record of legitimate contributions, led to Jia Tan being granted commit and release authority for the project.

A backdoor hidden in plain sight
In February 2024, Jia Tan inserted the backdoor across multiple commits in XZ Utils versions 5.6.0 and 5.6.1. The technical execution was remarkably sophisticated:
- Hiding mechanism: Malicious code was concealed within binary test fixture files (
.xzformat), making it invisible to source code review - Build-time injection: Malicious build scripts extracted and compiled the hidden code during the build process, injecting it into the resulting library
- Target: The backdoor hooked into sshd (OpenSSH server) through systemd’s dependency on liblzma, intercepting RSA signature verification to allow unauthorized remote access
- Selective activation: The backdoor only triggered when sshd was invoked by systemd on x86_64 Linux with glibc — a specific configuration that maximized impact while minimizing detection in test environments
The XZ Utils attack wasn’t a technical exploit — it was a social exploit. The attacker compromised a human, not a system, and used the trust relationships within the open source community as their attack vector.
Caught by curiosity, not security tools
The backdoor was not discovered by any security scanner, code review process, or automated tool. It was found because one engineer noticed a 500ms performance anomaly and was curious enough to investigate. This raises uncomfortable questions about how many similar compromises might exist undetected.
The XZ Utils incident is a stark reminder that performance monitoring and anomaly detection can catch threats that traditional security tooling misses entirely.
Systemic vulnerability in open source
The XZ Utils incident exposed a structural problem: critical infrastructure depends on software maintained by single individuals who are overworked, underfunded, and vulnerable to social pressure. The attacker exploited this reality directly.
Key lessons:
- Social engineering of open source maintainers is a viable and effective nation-state attack vector
- Single-maintainer projects supporting critical infrastructure represent systemic risk for the entire software ecosystem
- Build reproducibility and binary transparency could have detected the discrepancy between the source code and the build output
- The open source funding model is a security problem — projects depended upon by millions of organizations are often maintained by volunteers
- Automated security tools are necessary but insufficient — this backdoor was caught by human curiosity, not by scanners
Want to dig deeper? Explore the project repository for detailed analysis of the XZ Utils backdoor and other supply chain incidents.