News & Analysis on Middle East Independent, but not unbiased, striving for a multipolar world. Mainly focused on Iran & Resistance Axis. Ads: @Zhr_aaa22 Owner: @Hajj_Khomeini Introduction: https://t.me/Middle_East_Spectator/4 X: @spectator_mena
t.me
There was a surprising post in the above tg channel which was deleted after a few minutes, not sure if it was a gag or not.
'''
Need help identifying a jet urgently. dm @hajj_khomeini
'''
I am paraphrasing, as by the time i copied the link, and wanted to screenshot it, it was deleted. Middle_East_Spectator is a resistance, biased channel with about 0.35 million subscribers.
"Independent, but not unbiased, striving for a multipolar world. Mainly focused on Iran & Resistance Axis."
If this is indeed legit, crowdsourcing of knowledge in a war, is quite risky but rewarding if it pans out.
Somewhat of a tangent topic alert:
I did a forum search on this topic and it does not seem to be covered. A nation state based in UTC+02:00 timezone tried to put a backdoor in linux and was thwarted. And we all know our favorite psychopathic nation, Israel, is in that timezone.
The Internet Was Weeks Away From Disaster and No One Knew
AI Summary:
The Linux XZ Utils backdoor attempted hack in march 2024 (CVE-2024-3094) was a sophisticated supply chain attack that secretly embedded malicious code into a foundational Linux compression library. If successful, it would have granted attackers a "master key" to a vast number of Linux servers worldwide.
What the Backdoor Did
* Targeted SSH: The backdoor specifically hijacked the sshd process, which handles secure remote logins.
* Authentication Bypass: It allowed anyone possessing a specific private encryption key to log in without a valid password.
* Remote Code Execution (RCE): Beyond just logging in, it enabled attackers to execute arbitrary commands with root privileges (complete control) on the infected machine.
* Stealthy Execution: The malicious commands were executed directly by the SSH daemon, making them difficult to distinguish from normal system activity.
Potential Gains for the Attacker
The long-term nature of the operation—spanning over two years—suggests a highly motivated actor, potentially state-sponsored, seeking strategic advantages.
* Global Infrastructure Control: XZ is installed on billions of machines. Gaining access to these could have allowed for large-scale disruptions of critical infrastructure.
* Persistent Espionage: The backdoor provided a silent, long-term entry point for data exfiltration from governments and high-profile global companies.
* Lateral Movement: Once inside a single server, attackers could move through entire internal networks to compromise sensitive data or deploy ransomware.
* Strategic Sabotage: The ability to execute code at the root level means attackers could have altered system integrity, tampered with data, or performed denial-of-service (DoS) attacks at will.
* Exclusivity: The use of a specific private key ensured that only the original attackers could use the backdoor, preventing other hackers from stumbling upon and using the same exploit.
Massive disaster avoided just cause a developer was obsessive about half a second of time wasted.
Top comment from that video:
Alternate title - 'Guy pissed off at a 0.5 second login delay ends up saving the world'