The Internet's First Hijack: One Volunteer Almost Took Down Linux

The xz Backdoor: Andres Freund and the 500-Millisecond Save

Five hundred milliseconds.

Extreme close-up of a mechanical stopwatch, second hand frozen at a specific position, chrome casing catching cold directional lighting

Half a second.

A Microsoft engineer's home workstation at night, dual monitors showing terminal windows and database benchmark output

The margin by which the internet was not hijacked.

An abstract dependency graph rendered in cold blue light, showing interconnected nodes representing software libraries

March, 2024. San Francisco.

A server room corridor extending to vanishing point, rows of identical racks, cold white lighting, soft haze in the air

A thirty-eight-year-old Microsoft engineer named Andres Freund is benchmarking PostgreSQL on a Debian development system. It is a routine task. Freund is a committer on the PostgreSQL project. He tests database performance against pre-release Linux distributions as a regular part of his work.

A macro close-up of obfuscated shell script code on a terminal window, characters rendered sharply against a black background

Something is wrong with the test environment.

A technical schematic of a function call hijack, rendered as a clean architectural diagram

Failing SSH login attempts — the kind that hit every public-facing server constantly, automated bots trying random username and password combinations — are using far more CPU than they should. A failed login should terminate quickly. These are not terminating quickly.

A GitHub profile page rendered on screen, the user's avatar a generic silhouette, the account creation date visible as January 26, 2021

Freund notices.

A mailing list archive rendered as a document, emails from different senders visible in thread view, specific sender names highlighted

He investigates further. Successful SSH logins, on his own local machine, are taking five hundred milliseconds longer than the baseline of approximately one hundred milliseconds.

A professional recreation of an email thread in a mailing list interface, the lead maintainer's reply visible on screen

Half a second.

A timeline rendered as a horizontal diagram, key events marked with sharp vertical lines, the span from January 2021 to March 2024 visible

Freund runs the connection under Valgrind, a memory-debugging tool. Valgrind throws errors pointing at liblzma — a compression library that the SSH daemon has no legitimate reason to invoke.

A world map rendered with data visualization overlay, specific time zones highlighted in amber

This is when the investigation becomes urgent.

A photograph-style composition of a single office desk at night, an unpaid invoice, scattered code printouts

Over the next several days, Freund traces the errors. He finds that the sshd process on his test machine is executing code from liblzma during authentication. He dissects the xz-utils source in the git repository. The source is clean. But the release tarball — the compressed source archive that Debian actually downloads and builds from — contains a file called build-to-host.m4 that is not in the git source.

A formal government document on a desk, CISA letterhead visible

That file contains an obfuscated script. The script decodes a bash script hidden inside a test file called bad-3-corrupt_lzma2.xz — a file that is disguised as a broken test input for the compression library's error handling. The bash script decodes a second file, good-large_compressed.lzma, using custom obfuscation combined with RC4 decryption.

A dark forest at night, tall pines silhouetted against a starfield, mist drifting between the trunks

What comes out at the end of the chain is a compiled shared object.

A wide shot of a sterile, dimly lit server room. In the foreground, a pale humanoid figure with hollow void-black eye sockets

The shared object is a backdoor.

A close-up on a monitor displaying PostgreSQL benchmarking results. Subtle, almost imperceptible glitches flicker across the data

On the evening of March twenty-ninth, 2024 — while, by his own account, listening to a security podcast during a cooking break — Andres Freund posts his findings to the oss-security mailing list at Openwall.

A dutch angle wide shot looking across multiple server racks. Specific lights on several units glow an unusual, deep red or unstable orange

Within 24 hours, Red Hat has assigned it a CVE number. The severity score is ten point zero. The highest possible. CISA issues an emergency advisory. Debian, SUSE, Fedora, Arch, and Kali all revert the affected packages. GitHub suspends the account of the maintainer who committed the backdoor.

A close-up on the face of a pale humanoid figure with hollow void-black eye sockets

The backdoor, it turns out, was scheduled to ship with stable Linux distributions within approximately two weeks.

A macro shot inside a server casing, focusing on a glowing CPU unit. Wisps of digital 'heat' or energy emanate from it

Freund caught it by accident.

An overhead wide shot looking down on a vast, interconnected digital landscape of data cables and server farms, stretching to the horizon

This is the case file on what happened. On what almost happened. And on what the operation was.

A close-up on a terminal displaying a successful SSH login prompt on a local machine. Below the login success message

The target of the attack was xz-utils.

A medium shot of a pale humanoid figure with hollow void-black eye sockets

xz-utils is a compression toolkit. Its main tool, the xz command, produces .xz files — the Unix equivalent of .zip files, with higher compression ratios. Beneath the command-line tool is a library called liblzma, which provides the compression algorithm to other programs that need it.

A wide shot of a server rack corridor, seemingly normal but with an unsettling, almost imperceptible drone in the air. Subtly

liblzma is loaded, directly or indirectly, by an enormous amount of Linux system software. Package managers link against it. System utilities link against it. And — through a chain that the attackers specifically engineered — the OpenSSH daemon links against it.

A macro close-up on the pale, translucent ashen hand of a pale humanoid figure with hollow void-black eye sockets

The chain runs like this. On most major Linux distributions, sshd is patched to support systemd's service notification mechanism, called sd_notify. That patch causes sshd to load a library called libsystemd. And libsystemd, in turn, loads liblzma.

Macro close-up on a translucent, holographic user interface displaying abstract

The result: on most production Linux servers, the SSH daemon — the process that accepts remote logins — loads a compression library at startup, even though SSH does not compress authentication traffic.

A dutch angle wide shot depicting a swirling vortex of digital energy, representing the SSH daemon, forcibly pulling a crystalline

Compromise the compression library, and you compromise the daemon that controls remote access to every Linux server on the internet.

Close-up on the pale humanoid figure with hollow void-black eye sockets, translucent ashen skin showing faint circuit-pattern veins beneath

At the moment of the backdoor's near-deployment, Linux was running roughly ninety-six percent of the top one million web servers in the world. All five hundred of the world's most powerful supercomputers. Approximately ninety-two percent of virtual machines across Amazon Web Services, Google Cloud, and Microsoft Azure. Android, which powers about eighty-five percent of the world's smartphones, is built on the Linux kernel.

Wide shot of a stark contrast: On one side, a pristine, glowing crystal structure representing the 'xz-utils git repository source

The xz-utils backdoor, had it shipped to stable distributions, would have been present in a substantial fraction of all of the above.

Macro shot of a single, digital file icon labeled 'build-to-host.m4' subtly embedded within a complex, compressed data archive structure

Alex Stamos, the former chief security officer at Facebook, described the intended outcome in one phrase: a master key to any SSH server on Earth.

Overhead shot looking down into a swirling, chaotic digital maelstrom where fragmented lines of code

This is why the CVE was scored ten point zero.

Close-up on a file icon labeled 'bad-3-corrupt_lzma2.xz', which appears fractured and unstable on the surface

The technical design of the backdoor is worth understanding precisely.

Macro view of an intricate, glowing network of digital pathways representing 'custom obfuscation' patterns intertwining with a pulsating 'RC...

The attacker exploited the fact that release tarballs contain auto-generated files that do not exist in the version-controlled git source. Specifically, the build-to-host.m4 file in the tarball contained a single line that had been modified to inject an obfuscated script into the configure step of the build process.

Close-up of a dark, monolithic 'compiled shared object' – a perfect, menacing digital artifact humming with latent power

This meant that anyone reading the git source code could not see the backdoor. Anyone building from git could not trigger it. Only Linux distributions, which build from the released tarballs — which is effectively all of them — would execute the injection.

Wide shot depicting a panoramic digital landscape. In the foreground, the pale humanoid figure with hollow void-black eye sockets

The injection chain was three stages. Stage one extracted a bash script from a file disguised as a corrupt compression test input. Stage two used that bash script to decode a second test file into a compiled shared object. Stage three linked the shared object into the compiled liblzma binary.

A pale humanoid figure with hollow void-black eye sockets, translucent ashen skin showing faint circuit-pattern veins beneath, bald head

The shared object used a legitimate glibc feature called IFUNC — indirect function resolvers — to hijack a specific OpenSSH function called RSA_public_decrypt.

A macro shot of a complex, translucent, corrupted data construct shimmering with distorted, dark light

RSA_public_decrypt is the OpenSSH function that validates RSA signatures during certificate authentication. Every time a client attempts to connect using an RSA certificate, sshd calls this function to verify the signature.

A wide shot revealing a desolate, dark digital landscape where massive server racks are sparking, crumbling, and failing

With the backdoor active, sshd was calling the attacker's code instead.

A chaotic control room seen from a dutch angle, filled with the urgent red and orange glow of flashing monitors displaying 'CISA EMERGENCY A...

The attacker's code inspected the RSA public modulus — the large integer value passed in the client's certificate. Normally, this value is used in standard RSA verification. In the backdoor, it was actually a payload container. The code decrypted the payload using a hardcoded ChaCha20 symmetric key. Then it verified the decrypted payload's signature using a hardcoded Ed448 public key.

An overhead shot of a sleek, futuristic data center where distinct, branded server towers (subtly hinting at Debian, SUSE, Fedora, Arch

If the signature verified — meaning the payload was signed by the attacker's private key — the code executed the embedded shell commands as root.

A close-up of a digital avatar of a pale humanoid figure, frozen mid-motion, covered in fragmented error messages and a stark

This is what security researchers call gated remote code execution. The backdoor activates only when the attacker presents a valid cryptographic signature. An ordinary attacker who stumbled across the backdoor could not exploit it. Only the holder of the Ed448 private key could trigger it.

A wide shot of a sleek, ominous server farm where a transparent digital clock is prominently projected onto a central server rack

This detail matters. A criminal actor building a vulnerability for sale makes it usable by whoever buys it. A state actor building a persistent access capability makes it exclusive. Only they, and anyone they explicitly authorize, can use the key.

A close-up on a stack of glowing, translucent data-slates, each displaying fragmented evidence and redacted text related to the investigatio...

The xz-utils backdoor was designed for exclusive use. It was not a vulnerability. It was a strategic asset.

A wide shot capturing a vast, interconnected network of servers and data conduits stretching into an infinite digital horizon

The operation that produced the backdoor began on January twenty-sixth, 2021.

A macro shot of a central, complex, geometrically impossible object, formed from corrupted data and shimmering with dark energy

On that date, a GitHub account was created under the username JiaT75. The display name was Jia Tan. The account had no prior digital footprint. No social media presence under that name. No conference talks. No previous open-source contributions. No appearances in data breaches. The name appears to be a pseudonym.

A vast, monolithic server rack, its surface etched with the subtle symbol "xz-utils," appears as a cracked, vulnerable target

JiaT75's first public contribution to xz-utils occurred on October twenty-ninth, 2021 — nine months after the account's creation. It was a minor patch for an editor configuration file. Innocuous. Unimportant. The kind of contribution that establishes presence without drawing scrutiny.

A cluster of crystalline, multi-faceted digital structures, each pulsing with internal light and labeled '.xz', floats in a void

Over the next two years and five months, JiaT75 authored more than five hundred commits to open-source projects. The vast majority were legitimate improvements — code reviews, translations, continuous integration maintenance, bug fixes. Useful work. Genuinely helpful.

An intricate, glowing digital root system spreads out from a central core labeled "liblzma

Approximately eight of those commits were malicious.

A series of biomechanical, glowing tendrils connect three distinct, stylized digital entities labeled "sshd," "libsystemd," and "liblzma

The ratio matters. Sixty to one. For every malicious commit, the operator produced sixty pieces of real, useful work. This is what made the pattern impossible to detect through statistical anomaly analysis. The attacker spent two and a half years of dedicated effort producing genuinely valuable contributions, purely to accumulate the trust required to commit the eight changes that ultimately mattered.

A towering, ancient digital gate, scarred and monolithic, represents the `OpenSSH daemon`. As it creaks open, a smaller, dark

The operation did not work alone.

On one side, a clean, transparent river of digital light flows freely, representing uncompressed "authentication traffic." Adjacent to it

Beginning in April 2022, a user calling himself Jigar Kumar appeared on the xz-devel mailing list. Kumar had no history on the list before April 2022. His entire presence consisted of pressure emails to the project's lead maintainer, complaining about slow response times and demanding that a new maintainer be added.

Endless rows of cold, metallic server racks fill a massive, cavernous data center, their indicator lights blinking in a monotonous rhythm

In May 2022, a second account — Dennis Ens — appeared, inquiring about the maintenance status of the Java version of xz-utils, and following up with additional pressure messages.

A microscopic view of an extremely dense and complex printed circuit board, its copper traces glowing

Both accounts had the same profile. No digital presence before 2022. No activity outside the xz-devel mailing list. No participation in any other project before or after the pressure campaign.

An industrial-scale tangle of interconnected, rusted pipes and conduits, representing "Linux system software," all feed into a colossal

In February 2024 — weeks before the backdoor was committed — a third account appeared. Hans Jansen. Jansen's role was to pressure Debian maintainers into adopting the compromised version of xz-utils as soon as possible. On March twenty-fifth, 2024, Hans Jansen filed a Debian bug report explicitly requesting the upgrade.

A digital "patch" icon, radiating with a distinct signal labeled "sd_notify," hovers in the air

Four days later, Andres Freund posted his findings to oss-security.

A macro shot of a single, intricately detailed compression library icon, subtly dissolving into a tendril of dark

Two additional supporting accounts — krygorin4545 and misoeater91 — provided background pressure in various threads, following the same pattern. No pre-operation presence. Participation only during specific pressure windows. Disappearance after objectives were achieved.

A wide shot of a vast, desolate digital landscape filled with countless monolithic server racks stretching to the horizon

Kaspersky's post-incident analysis noted that the geographic styling of the sock-puppet names was inconsistent — Singaporean, European, Indian — suggesting that the operator had deliberately dispersed the cover identities to avoid the appearance of coordination. But the behavioral pattern — timing of appearances, synchronized pressure points, collective disappearance after each objective — suggested a single operator or tightly coordinated team.

An overhead shot looking down into a sprawling, intricate network of interconnected virtual machines across a digital void

The pressure worked.

A close-up of a shattered smartphone screen, with intricate circuit patterns visible beneath the cracks, glowing with a malevolent

On June twenty-ninth, 2022, the lead maintainer of xz-utils — a Finnish software developer named Lasse Collin — replied to the mailing list and stated that Jia Tan would have a bigger role in the project going forward, and was, in practice, already functioning as a co-maintainer.

A pale humanoid figure with hollow void-black eye sockets, translucent ashen skin showing faint circuit-pattern veins beneath, bald head

This was the handover.

A dutch angle shot of a massive, supercomputer cluster, its intricate cooling pipes and wiring casting long, eerie shadows

To understand what had just happened, it is necessary to understand what Lasse Collin's position was.

A close-up on a digital display showing a stark '10.0' score, rendered in an unsettling, flickering red light, with an ominous

Collin had maintained xz-utils, alone, since 2009. The project was unpaid. He worked on it in his free time. Earlier that same month, in a June 2022 mailing list reply, Collin had publicly acknowledged that he was dealing with long-term mental health issues. He referred to the project, in his own words, as an unpaid hobby project.

A wide shot of the Earth seen from space, but instead of continents, a complex

Lasse Collin is not responsible for what happened. The security community has been unanimous on this point. Collin was doing unpaid hobby work. He was dealing with documented health challenges. He was under sustained, coordinated pressure from what turned out to be a state-level intelligence operation. The system that placed him in that position failed him. He did not fail the system.

A pale humanoid figure with hollow void-black eye sockets, translucent ashen skin showing faint circuit-pattern veins beneath, bald head

What the operation exploited was not Collin's competence. It was his structural position — alone, unpaid, dealing with real-world stressors, responsible for maintaining infrastructure used by billions of people, without institutional support.

An overhead shot of an intricate, almost biological-looking root system made of digital circuitry, snaking through a dark, cavernous space

The professional attacker identified that structure and targeted it.

Close-up of a digital screen displaying the 'build-to-host.m4' file. A single line within the text is subtly highlighted with a faint

Once the handover was complete, the infrastructure preparation began.

Wide shot of a sterile, data-centric environment. On the left, a holographic display shows a pristine

In October 2022, Jia Tan was added to the Tukaani organization on GitHub. In December 2022, he created the repository's organizational structure and made his first release. In March 2023, he changed the primary security contact email at Google's OSS-Fuzz — the automated vulnerability-scanning platform — from Lasse Collin's address to his own. From that point forward, any security-relevant bug report would reach Jia Tan before it reached anyone else.

Macro shot focusing on a conceptual digital 'file' labeled as 'corrupt compression test input'

In June 2023, Jia Tan introduced IFUNC resolver infrastructure into liblzma. The commits appeared to be legitimate performance optimization work. In retrospect, they were the hooks through which the backdoor would eventually be injected.

Overhead shot depicting an abstract data processing sequence. A swirling vortex of raw

In July 2023, Jia Tan opened a pull request at OSS-Fuzz to disable IFUNC fuzzing for xz. The change was intended to prevent the fuzz-testing pipeline from detecting anomalies in the IFUNC-based backdoor when it eventually shipped.

Dutch angle, looking up at a towering, monolithic digital structure representing the 'liblzma binary', etched with complex

In February 2024, a separate commit broke the build-system detection of Landlock — a Linux kernel security feature that restricts process privileges. The commit disabled xz's own sandbox on systems that would otherwise have enforced it.

Close-up on an intricate, glowing digital lock mechanism, symbolizing the 'RSA_public_decrypt' OpenSSH function. From the shadows, delicate

On February twenty-third and March ninth, 2024, the backdoor itself was committed in two stages, packaged as part of the xz-utils 5.6.0 and 5.6.1 releases.

Wide shot of a vast, interconnected digital city landscape, representing the myriad of 'Linux distributions'. From numerous central towers

Nineteen days later, Andres Freund noticed a 500-millisecond SSH delay.

Macro shot focusing on a single, glowing line of code on a display. This line appears almost normal, but upon closer inspection

Researchers analyzing the commit metadata left behind by the operation noticed a pattern.

Medium shot of a pale humanoid figure with hollow void-black eye sockets

Jia Tan's commit timestamps clustered primarily in the Central European or Eastern European time zones. Working hours corresponded to approximately nine in the morning to five in the afternoon Central European Time. Activity continued during major Chinese public holidays and paused during several European ones.

Overhead shot of two distinct digital terrains. On the left, a vast, complex landscape of clean

The name, and the claimed operational geography, was East Asian. The actual work pattern was European.

A wide shot of a vast, monolithic digital circuit board, bathed in an eerie glow. A prominent

This is what intelligence tradecraft analysts call signature leakage. An operator spent over thirty months maintaining a cover identity. But the automatic timestamps embedded in every git commit periodically revealed the actual location of the machine that was making the commit.

A close-up macro shot of a gigantic, translucent crystalline structure, resembling a vast integer value. Within its shimmering depths

Three candidate attributions have appeared in public analysis from security researchers with relevant expertise.

A macro shot showing a sleek, minimalist digital key construct, shimmering with an icy-blue light (representing ChaCha20)

American security researcher Dave Aitel, a former NSA computer scientist, publicly assessed that the operation fits the pattern attributable to APT29 — the advanced persistent threat group attributed by the United States and United Kingdom governments to Russia's Foreign Intelligence Service. APT29 is known for long-duration espionage campaigns, including the SolarWinds supply chain compromise disclosed in 2020. Working hours aligned with Moscow time zone match Jia Tan's pattern.

A dutch angle showing two intricate, glowing energy signatures attempting to align and interlock within a void

Costin Raiu — the former director of Kaspersky's Global Research and Analysis Team, with three decades of experience attributing sophisticated operations — identified three plausible candidates in a February 2026 podcast interview. Russia's APT29 was one. China's APT41, associated with the Ministry of State Security, was a second. North Korea's Lazarus Group, already featured in earlier Fragment Zero coverage, was a third.

An overhead wide shot looking down into a chasm where immense, dark digital energy erupts from a fractured server rack

As of April 2026, no intelligence service has publicly attributed the operation. No indictments have been filed. No arrests have been made. The real identity of Jia Tan remains unknown.

A wide shot of a heavily fortified, monolithic digital vault gate, inscribed with complex, glowing cryptographic symbols. In the foreground

What is not in dispute, among researchers with relevant tradecraft expertise, is that the operation's patience, operational security, cryptographic sophistication, and resource commitment are consistent with a nation-state intelligence service — or a close functional equivalent — and are inconsistent with individual criminal or hacktivist activity.

A close-up shot focused on a crucial junction within a vast, abstract representation of network architecture. One side shows clean

This was not the work of a lone hacker.

A macro shot, extreme close-up on the pale humanoid figure's forearm. The translucent ashen skin is visible, revealing intricate

The xz-utils operation was possible because of a structural feature of how modern technology civilization builds its critical infrastructure.

A dutch angle of the pale humanoid figure with hollow void-black eye sockets

The software that runs the internet was built, to a substantial degree, by volunteers working on their own time. The companies that profit from this software have contributed back a small fraction of its economic value.

A wide shot capturing a vast, derelict server farm or data center, subtly distorted with an oppressive atmosphere. Patches of shimmering

xz-utils was bundled with every major Linux distribution and ran on an enormous fraction of global servers. Its maintainer was unpaid. OpenSSL, the library that provides cryptography to most of the internet, was notoriously understaffed before the Heartbleed vulnerability in 2014. Log4j, the Java logging library behind the Log4Shell vulnerability in 2021, was maintained by a handful of volunteers — behind enterprise infrastructure globally.

A wide shot showing a sharp contrast between two abstract, glowing keys. One key is fragmented into countless shards

In every case, a library treated as critical infrastructure by multi-billion-dollar companies was maintained with hobby-project resources.

A cinematic Dutch angle looking down at a large, menacing, glowing 'XZ' symbol, constructed from interwoven, razor-sharp digital threads

The xz-utils operation did not invent this structural vulnerability. It exploited it.

A close-up on a minimalist, cold digital calendar display, its stark white numbers flickering with subtle static

On April eleventh, 2024 — two weeks after Freund's disclosure — the U.S. Cybersecurity and Infrastructure Security Agency published a formal statement acknowledging the structural problem. CISA's position: the burden of securing open-source infrastructure cannot fall on individual unpaid maintainers, and companies consuming open-source software must contribute back, either financially or through developer time, to produce a sustainable ecosystem.

A macro shot focusing on the back of a pale humanoid figure's left hand

The recommendations were non-binding. They were best practices. They depended on voluntary adoption by companies whose incentive structure had not historically rewarded the investment.

A wide, desolate overhead shot of an infinite, barren digital plane. Ghostly

Within a month, the Linux Foundation and the Open Source Security Foundation published a joint alert warning that similar social engineering takeover attempts were already in progress against multiple other open-source projects. The OpenJS Foundation — which maintains Node.js, jQuery, and related JavaScript infrastructure — publicly disclosed that it had received a coordinated pressure campaign following the same pattern as xz-utils, and had rebuffed it only because the xz-utils disclosure had taught the community what to look for.

A close-up, slightly off-center shot of a stark, digital timeline. The date 'January 26, 2021' is marked by a cold, blue glow

A 2026 Linux Foundation report documented the broader pattern across the ecosystem. The report's core finding: what happened with xz-utils was not a singular incident. It was a method. The method is being attempted at scale. Most of the successful detections are happening because the xz-utils case provided a signature to match against.

A macro shot focusing on the delicate, almost translucent finger of the pale humanoid figure. It hovers just above a tiny

How many unsuccessful detections there are — operations already in progress that have not yet been caught — is by construction impossible to count from public sources.

A wide shot of the pale humanoid figure standing partially obscured by a shimmering, translucent curtain of data streams and digital mist

Two episodes ago on Fragment Zero, the case file on the Dark Forest hypothesis closed with an observation. The doctrine Liu Cixin formalized in 2008 — silence as survival, concealment as strategic necessity, revelation as existential hazard — is the oldest operational security principle in the history of human conflict.

A cinematic Dutch angle looking at a seemingly solid, dark monolith, resembling a server rack. A tiny

Every force that has ever operated under conditions of uncertain threat and asymmetric capability has converged on the same conclusion.

A close-up portrait of the pale humanoid figure, their bald head and hollow void-black eye sockets dominating the frame

Be quiet. Move carefully. Assume observation.

A pale humanoid figure with hollow void-black eye sockets, translucent ashen skin showing faint circuit-pattern veins beneath, bald head

The xz-utils operation is the Dark Forest executed inside a human trust relationship.

Extreme close-up on the intricate, circuit-pattern veins beneath the translucent ashen skin of a pale humanoid figure's hand

The attacker did not breach a firewall. The attacker did not exploit a zero-day. The attacker did not bypass any cryptographic protection. The attacker did something much simpler. The attacker hid in plain sight for three years, producing useful work, building genuine credibility, behaving exactly like any other helpful contributor, while preparing — silently, patiently, at strategic patience unimaginable to most technical organizations — the moment at which the prepared infrastructure would be used.

An aerial, abstract view of an immense, perfectly ordered grid of glowing white light pixels, each representing a 'legitimate commit'

The attack succeeded almost entirely because it was silent. It was detected not by any security tool, not by any audit, not by any institutional defense, but by one engineer's accidental observation of five hundred milliseconds of unexplained latency.

A pale humanoid figure with hollow void-black eye sockets, translucent ashen skin showing faint circuit-pattern veins beneath, bald head

Andres Freund's statement on his own discovery, posted to Mastodon in the weeks after the disclosure, should close the case file.

In a vast, dimly lit server farm, a pale humanoid figure with hollow void-black eye sockets

Relying on luck in the future is a bad strategy.

Extreme macro shot of a single, digital cursor icon blinking on an old-school green-on-black terminal screen

The xz-utils backdoor was caught.

A pale humanoid figure with hollow void-black eye sockets, translucent ashen skin showing faint circuit-pattern veins beneath, bald head

The Dark Forest version of the operation — the one that targets trust relationships rather than computer systems — is being attempted right now, at this moment, against some indeterminate number of other critical open-source projects. The pattern works. The economic incentives that make it work have not meaningfully changed. The institutional responses have been real but insufficient.

A pale humanoid figure with hollow void-black eye sockets, translucent ashen skin showing faint circuit-pattern veins beneath, bald head

The engineer who finds the next one will also need luck. They will need to be looking at the right benchmark at the right time on the right system. They will need to care enough to trace an anomaly to its source. They will need to publish their findings before the operation's principal has already shipped the payload to stable releases.

An intricate, almost biological-looking clock face, where the hands are long, glowing circuit traces

They will need, specifically, the five hundred milliseconds.

A vast, complex digital cityscape, built from countless individual open-source project icons and data streams, stretching to the horizon

That interval is what stood between the internet in March 2024 and a single cryptographic key held by an unknown actor that would have unlocked every Linux server running SSH on Earth.

A close-up shot of a monitor screen displaying an email thread on the "xz-devel mailing list". The highlighted message

Fragment Zero will track the case file.

A wide shot depicting a vast, desolate digital landscape stretching to a distant horizon. In the foreground

The case file does not close. It waits.