Tag

Supply Chain Attack

posts

Removed Legitimate Software

Removed Legitimate Software: How Attackers Exploit Trust

The Trojan Horse You Already Installed In March 2024, a lone developer named Andres Freund noticed something odd: SSH connections were taking 500 milliseconds too long. That curiosity uncovered the XZ Utils backdoor — a sophisticated supply chain attack where a threat actor had spent two years building trust as a

Carl B. Johnson Dec 13, 2025 6 min read