{"id":856,"date":"2024-04-17T20:00:59","date_gmt":"2024-04-17T18:00:59","guid":{"rendered":"https:\/\/demo.artureanec.com\/themes\/neuros\/how-natural-language-processing-is-revolutionizing-text-analysis-2-copy\/"},"modified":"2024-07-16T12:44:00","modified_gmt":"2024-07-16T10:44:00","slug":"der-xz-angriff-eine-erschuetterung-in-der-software-lieferkette","status":"publish","type":"post","link":"https:\/\/www.neonotu.com\/en\/der-xz-angriff-eine-erschuetterung-in-der-software-lieferkette\/","title":{"rendered":"The XZ attack: a shake-up in the software supply chain"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"856\" class=\"elementor elementor-856\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-78f26170 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"78f26170\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a7f5906\" data-id=\"6a7f5906\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6970a568 elementor-widget elementor-widget-text-editor\" data-id=\"6970a568\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p class=\"whitespace-pre-wrap break-words\"><strong>Die Cybersicherheitswelt wurde k\u00fcrzlich durch einen der raffiniertesten Software-Lieferkettenangriffe ersch\u00fcttert: den XZ-Angriff. Dieser Vorfall zeigt eindrucksvoll, wie verwundbar selbst vertrauensw\u00fcrdige Open-Source-Projekte sein k\u00f6nnen.<\/strong><\/p>\n<p class=\"whitespace-pre-wrap break-words\">Der Angriff im Detail:<\/p>\n<ol class=\"-mt-1 list-decimal space-y-2 pl-8\">\n<li class=\"whitespace-normal break-words\">Ein Angreifer namens &#8222;Jia Tan&#8220; baute \u00fcber zwei Jahre hinweg Vertrauen in der Open-Source-Community auf.<\/li>\n<li class=\"whitespace-normal break-words\">Er erlangte Zugang und Maintainer-Status f\u00fcr die XZ-Kompressionsbibliothek.<\/li>\n<li class=\"whitespace-normal break-words\">In die Unterbibliothek liblzma wurde eine Hintert\u00fcr eingebaut.<\/li>\n<li class=\"whitespace-normal break-words\">Diese Hintert\u00fcr erm\u00f6glichte unbemerkten Zugriff auf Linux-Systeme \u00fcber SSH.<\/li>\n<\/ol>\n<p class=\"whitespace-pre-wrap break-words\">Warum ist dieser Angriff so besorgniserregend?<\/p>\n<ul class=\"-mt-1 list-disc space-y-2 pl-8\">\n<li class=\"whitespace-normal break-words\">Er zeigt die Gefahr von &#8222;Malicious Maintainer&#8220;-Angriffen.<\/li>\n<li class=\"whitespace-normal break-words\">Herk\u00f6mmliche Sicherheitstools wie ASPM, statische und dynamische SCAs konnten den Angriff nicht erkennen.<\/li>\n<li class=\"whitespace-normal break-words\">Der Angriff nutzte das Vertrauen in der Open-Source-Community aus.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n\n<figure class=\"wp-block-pullquote has-text-align-left has-background\" style=\"background-color: #f0f2f4;\">\n<blockquote>\n<p class=\"whitespace-pre-wrap break-words\">Lehren f\u00fcr die Cybersicherheit:<\/p>\n<ol class=\"-mt-1 list-decimal space-y-2 pl-8\">\n<li class=\"whitespace-normal break-words\">Vertrauen allein reicht nicht aus \u2013 kontinuierliche \u00dcberpr\u00fcfung ist notwendig.<\/li>\n<li class=\"whitespace-normal break-words\">Herk\u00f6mmliche Sicherheitstools haben Grenzen bei ausgekl\u00fcgelten Angriffen.<\/li>\n<li class=\"whitespace-normal break-words\">Neue Ans\u00e4tze wie Binary-to-Source-Analyse und KI-basierte Erkennung b\u00f6sartigen Codes sind erforderlich.<\/li>\n<\/ol>\n<\/blockquote>\n<\/figure>\n\n<p class=\"whitespace-pre-wrap break-words\">Bei neonotu security verstehen wir die Komplexit\u00e4t solcher Angriffe. Unsere Experten arbeiten st\u00e4ndig daran, fortschrittliche L\u00f6sungen zu entwickeln, die auch raffinierte Angriffe wie den XZ-Angriff erkennen k\u00f6nnen.<\/p>\n<p class=\"whitespace-pre-wrap break-words\">Sch\u00fctzen Sie Ihre Software-Lieferkette:<\/p>\n<ul class=\"-mt-1 list-disc space-y-2 pl-8\">\n<li class=\"whitespace-normal break-words\">Implementieren Sie mehrstufige Sicherheitskontrollen<\/li>\n<li class=\"whitespace-normal break-words\">Nutzen Sie fortschrittliche Analysetools<\/li>\n<li class=\"whitespace-normal break-words\">Schulen Sie Ihr Team in Bezug auf neue Bedrohungen<\/li>\n<\/ul>\n<p class=\"whitespace-pre-wrap break-words\">Kontaktieren Sie uns f\u00fcr eine umfassende Sicherheitsbewertung Ihrer Software-Lieferkette. Gemeinsam k\u00f6nnen wir Ihre digitalen Assets vor den raffiniertesten Bedrohungen sch\u00fctzen.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-05b0fe9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"05b0fe9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ad6e074\" data-id=\"ad6e074\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc5e013 neuros-button-border-style-gradient neuros-button-bakground-style-solid elementor-widget elementor-widget-neuros_button\" data-id=\"fc5e013\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"neuros_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n        <div class=\"button-widget\">\n            <div class=\"button-container\">\n                                <a class=\"neuros-button\" href=\"\/en\/angebot-anfordern\/\" target=\"_blank\">Jetzt Sicherheitsberatung anfordern                        <span class=\"icon-button-arrow left\"><\/span><span class=\"icon-button-arrow right\"><\/span>                    \n                    <span class=\"button-inner\"><\/span>\n                <\/a>\n                            <\/div>\n        <\/div>\n        \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The cybersecurity world was recently rocked by one of the most sophisticated software supply chain attacks: the XZ attack. This incident impressively demonstrates how vulnerable even trusted open source projects can be. The attack in detail: An attacker named \u201cJia Tan\u201d built up trust in the open source community over a period of two years...<\/p>","protected":false},"author":1,"featured_media":14398,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[62],"tags":[68,66,67,69],"class_list":["post-856","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberanriff","tag-cyberthreat","tag-liblzma","tag-malware","tag-opensource"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.neonotu.com\/en\/wp-json\/wp\/v2\/posts\/856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.neonotu.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.neonotu.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.neonotu.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.neonotu.com\/en\/wp-json\/wp\/v2\/comments?post=856"}],"version-history":[{"count":0,"href":"https:\/\/www.neonotu.com\/en\/wp-json\/wp\/v2\/posts\/856\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.neonotu.com\/en\/wp-json\/wp\/v2\/media\/14398"}],"wp:attachment":[{"href":"https:\/\/www.neonotu.com\/en\/wp-json\/wp\/v2\/media?parent=856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.neonotu.com\/en\/wp-json\/wp\/v2\/categories?post=856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.neonotu.com\/en\/wp-json\/wp\/v2\/tags?post=856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}