www.accuknox.com Open in urlscan Pro
2606:4700:20::681a:647  Public Scan

URL: https://www.accuknox.com/blog/cve-2024-3094-xz-liblzma-backdoor-attack-protection
Submission Tags: urlscan
Submission: On May 02 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.accuknox.com/

<form role="search" method="get" id="search-form" action="https://www.accuknox.com/">
  <input type="search" value="" name="s" id="s" placeholder="Enter Search Keywords" required="">
  <input type="hidden" id="searchsubmit" value="SEARCH">
  <button type="submit"><svg width="43" height="42" viewBox="0 0 43 42" fill="none" xmlns="http://www.w3.org/2000/svg">
      <rect width="43" height="42" rx="21" fill="#0044FE"></rect>
      <path
        d="M20.5 28C18.9667 28 17.5417 27.625 16.225 26.875C14.925 26.1083 13.8917 25.075 13.125 23.775C12.375 22.4583 12 21.0333 12 19.5C12 17.9667 12.375 16.55 13.125 15.25C13.8917 13.9333 14.925 12.9 16.225 12.15C17.5417 11.3833 18.9667 11 20.5 11C22.0333 11 23.45 11.3833 24.75 12.15C26.0667 12.9 27.1 13.9333 27.85 15.25C28.6167 16.55 29 17.9667 29 19.5C29 21.0333 28.6167 22.4583 27.85 23.775C27.1 25.075 26.0667 26.1083 24.75 26.875C23.45 27.625 22.0333 28 20.5 28ZM20.5 26C21.7333 26 22.8417 25.725 23.825 25.175C24.825 24.6083 25.6 23.8333 26.15 22.85C26.7167 21.85 27 20.7333 27 19.5C27 18.2667 26.7167 17.1583 26.15 16.175C25.6 15.175 24.825 14.4 23.825 13.85C22.8417 13.2833 21.7333 13 20.5 13C19.2667 13 18.15 13.2833 17.15 13.85C16.1667 14.4 15.3917 15.175 14.825 16.175C14.275 17.1583 14 18.2667 14 19.5C14 20.7333 14.275 21.85 14.825 22.85C15.3917 23.8333 16.1667 24.6083 17.15 25.175C18.15 25.725 19.2667 26 20.5 26ZM24.575 25L26 23.575L30.2 27.8C30.4833 28.0833 30.5667 28.4 30.45 28.75C30.3333 29.1 30.1 29.3417 29.75 29.475C29.4167 29.5917 29.1 29.5 28.8 29.2L24.575 25Z"
        fill="white"></path>
    </svg>
    <div>SEARCH</div>
  </button>
</form>

GET https://www.accuknox.com/

<form role="search" method="get" id="search-form" action="https://www.accuknox.com/">
  <input type="search" value="" name="s" id="s" placeholder="Enter Search Keywords" required="">
  <input type="hidden" id="searchsubmit" value="SEARCH">
  <button type="submit"><svg width="43" height="42" viewBox="0 0 43 42" fill="none" xmlns="http://www.w3.org/2000/svg">
      <rect width="43" height="42" rx="21" fill="#0044FE"></rect>
      <path
        d="M20.5 28C18.9667 28 17.5417 27.625 16.225 26.875C14.925 26.1083 13.8917 25.075 13.125 23.775C12.375 22.4583 12 21.0333 12 19.5C12 17.9667 12.375 16.55 13.125 15.25C13.8917 13.9333 14.925 12.9 16.225 12.15C17.5417 11.3833 18.9667 11 20.5 11C22.0333 11 23.45 11.3833 24.75 12.15C26.0667 12.9 27.1 13.9333 27.85 15.25C28.6167 16.55 29 17.9667 29 19.5C29 21.0333 28.6167 22.4583 27.85 23.775C27.1 25.075 26.0667 26.1083 24.75 26.875C23.45 27.625 22.0333 28 20.5 28ZM20.5 26C21.7333 26 22.8417 25.725 23.825 25.175C24.825 24.6083 25.6 23.8333 26.15 22.85C26.7167 21.85 27 20.7333 27 19.5C27 18.2667 26.7167 17.1583 26.15 16.175C25.6 15.175 24.825 14.4 23.825 13.85C22.8417 13.2833 21.7333 13 20.5 13C19.2667 13 18.15 13.2833 17.15 13.85C16.1667 14.4 15.3917 15.175 14.825 16.175C14.275 17.1583 14 18.2667 14 19.5C14 20.7333 14.275 21.85 14.825 22.85C15.3917 23.8333 16.1667 24.6083 17.15 25.175C18.15 25.725 19.2667 26 20.5 26ZM24.575 25L26 23.575L30.2 27.8C30.4833 28.0833 30.5667 28.4 30.45 28.75C30.3333 29.1 30.1 29.3417 29.75 29.475C29.4167 29.5917 29.1 29.5 28.8 29.2L24.575 25Z"
        fill="white"></path>
    </svg>
    <div>SEARCH</div>
  </button>
</form>

Text Content

SEARCH



 * PRODUCTS
   
   
   DEFEND ZERO DAY ATTACKS
   
   Garner holistic visibility across development and deployment life cycle.
   Mitigate risks proactively to foil attacks with our most advanced and
   sophisticated CNAPP product.
   
   Platform Overview Platform Integrations Platform Pricing
   
   
   OPEN SOURCE
   
   
   
   
   ZERO TRUST CLOUD SECURITY
   
   CNAPP
   
   Robust security for multi cloud & On prem deployments
   
   CSPM
   
   Tailor made to secure SaaS and private cloud environments
   
   CWPP
   
   Observability & Enforcement for K8s, VMs, Container workloads
   
   KIEM
   
   Visualize and Secure Kubernetes Access
   
   Kubernetes (K8s) Security
   
   Secure Kubernetes with Inline Prevention
   
   Container Security
   
   Protect containerized applications from potential attacks
   
   Runtime Security
   
   Inline prevention instead of post-attack mitigation
   
   
   FUTURE PROOF SECURITY SOLUTIONS
   
   5G Security
   
   Securing 5G-ORAN and Control plane with Zero Trust Model
   
   IoT / Edge Security
   
   Safeguard connected devices and IoT workloads globally
   
   
   AI/LLM POWERED CLOUDSECOPS
   
   AskAda
   
   
   ZERO TRUST SECURITY FOR LLM'S
   
   LLMKnox [Q3 2024 Release]
   
   
   SECTORS
   
   Federal
   
   
   ACCUKNOX IS THE FIRST 5G SECURITY-ORAN TO BE PUBLISHED ON NEPHIO
   
   From fortifying the control plane to addressing vulnerabilities in the data
   plane, read the white paper and discover the crucial steps we need to take in
   order to enhance the security of 5G networks.
   
   DOWNLOAD NOW
 * SOLUTIONS
   
   
   NEVER TRUST, ALWAYS VERIFY.
   
   Protect Applications, Networks, and Data with our advanced cloud-native
   security offerings for all your cloud-native needs. From Infrastructure to
   Applications, we have you covered!
   
   Platform Overview Platform Integrations Platform Pricing
   
   
   OPEN SOURCE
   
   
   
   
   ASPM
   
   Vulnerability Management
   CI/CD Pipeline Security
   Software Composition Analysis (SCA)
   Static Application Security Testing (SAST)
   Dynamic Application Security Testing (DAST)
   Supply Chain Security
   
   
   CSPM
   
   Asset Inventory
   Misconfiguration and Drift Detection
   Continuous Diagnostics and Mitigation (CDM)
   Cloud Detection and Response (CDR)
   
   
   CWPP
   
   Kubernetes Workload Hardening
   Zero Trust Security
   Container and VM Forensics
   Automated ZT Policy Enforcement
   Application Behavior Modeling
   
   
   PUBLIC CLOUDS
   
   Azure Cloud Security
   Google Cloud Security
   AWS Cloud Security
   Oracle Cloud Security
   
   
   PRIVATE CLOUDS
   
   OpenShift Security
   VMWare Tanzu Security
   Bare Metal Security
   
   
   ACCUKNOX IS NOW ON VMWARE MARKETPLACE
   
   AccuKnox is a high-performance solution that leverages existing linux kernel
   primitives at the host level to monitor app behavior and enforce security
   policies. And by automating policy discovery and deployment, LSMs like
   AppArmor and SELinux can be extremely powerful.
   
   START NOW
 * OPEN SOURCE
 * RESOURCES
   
   
   KNOWLEDGE HUB
   
   Stay informed about the latest developments in CNAPP and cloud security
   through our curated assortment of enlightening blog posts, instructive
   tutorials, illuminating case studies, and noteworthy press releases
   
   Platform Overview Platform Integrations Platform Pricing
   
   
   OPEN SOURCE
   
   
   Analyst Reports
   
   Reports from cybersecurity industry gurus
   
   Blogs
   
   Latest Zero day attacks, malware resolution techniques
   
   Data Sheets
   
   Understand AccuKnox Offerings via Datasheets
   
   eBooks
   
   Harness the potentials of CNAPP in Zero Trust Security
   
   Press Releases
   
   Joining Forces with Esteemed Partners to Drive Innovation
   
   Technical Papers
   
   Contain in-depth test results and comparative studies
   
   White Papers
   
   Cutting-edge White Papers: Revolutionizing CNAPP Strategies
   
   Videos
   
   Cloud native security webinars and videos
   
   
   HELP DOCUMENTATION
   
   Cloud Onboarding
   
   Simplified Steps to onboard Cloud Account with AccuKnox
   
   Cluster Onboarding
   
   Onboarding Steps for AKS, EKS, GKE & More
   
   User Manual
   
   Guides & Tutorials to use AccuKnox CNAPP
   
   Support Matrix
   
   All the platforms and providers that we support
   
   
   INDUSTRY PAPERS
   
   Kubernetes
   
   Embracing the Agility of Kubernetes
   
   
   ACCUKNOX OPENSOURCE SECURITY FOR OPEN HORIZON WORKLOADS
   
   We provide Observability & Enforcement to IBM Open Horizon! Deploying the
   edge workloads in either containerized mode or k8s orchestrated mode. The
   Open Horizon Edge Agent operates directly on the host as a systemd process.
   
   EXPLORE NOW
 * COMPANY
   
   
   CLOUD NATIVE SECURITY REDEFINED
   
   Accelerate your cloud journey with our battle-tested expertise, delivering a
   comprehensive zero trust framework that safeguards cloud infrastructure and
   applications from targeted attacks.
   
   Platform Overview Platform Integrations Platform Pricing
   
   
   OPEN SOURCE
   
   
   Mission & Vision
   
   Fueling Innovation & Advancing Our Purpose
   
   Leadership
   
   Uniting Brilliance in our product’s collective expertise
   
   Careers
   
   Join talented teams for exciting opportunities
   
   Core Values
   
   Cultivating a Culture anchored & rooted in our core values
   
   Investors
   
   Harnessing the Expertise of Visionary Investors for Success
   
   AccuKnox Federal
   
   Leverage Air Gapped and On-Premise fortification
   
   Partnership with SRI International
   
   Built in partnership with SRI and anchored on seminal patents
   
   Patents
   
   Testament to Our Commitment to Technological Excellence
   
   Awards & Recognitions
   
   Honors & Accolades for Our Outstanding Achievements
   
   AccuKnox Team
   
   Meet the team that drives our success
   
   Contact Us
   
   Discover how we can collaborate for Zero Trust Cloud Security
   
   Brand Guidelines
   
   Brand style instruction manual
   
   
   COMPARISONS
   
   Wiz
   AquaSec
   Calico Cloud
   Prisma Cloud
   Orca Security
   Checkpoint
   PingSafe
   Crowdstrike
   
   
   KUBEARMOR IS NOW CERTIFIED REDHAT OPENSHIFT OPERATOR
   
   Embracing the Power of Open Source: We are proud to contribute to the
   open-source community, allowing businesses to leverage the strength of
   KubeArmor to safeguard their containerized environments.
   
   TRY NOW
 * PARTNERS
   
   
   BENEFITS OF ACCUKNOX PARTNERSHIP
   
   Being a partners first company, we are strategic and well program to deliver
   joint go to market and sales motion. AccuKnox has 7 channel partner types and
   win win business plan.
   
   Platform Overview Platform Integrations Platform Pricing
   
   
   OPEN SOURCE
   
   
   
   
   PARTNER TYPES
   
   Cloud Partners
   
   Hyperscaler Cloud Providers partnered with us
   
   Technology Partners
   
   Innovate together and secure the future of public & private clouds
   
   System Integration & Channel Partners
   
   Partner with us for creating joint reference architecture
   
   
   CHANNEL PARTNERS
   
   Find a Partner
   
   Explore the list of Global trusted partner list
   
   Become a Partner
   
   Grow with us and become an AccuKnox partner.
   
   
   PARTNER PROGRAMS
   
   AccuKnox MAX Program
   
   Explore and join the AccuKnox Market Aligned eXcellence
   
   Join Design Partnership Program
   
   We welcome the design partners for win-win advisership
   
   
   CLINT HEALTH PARTNERS WITH ACCUKNOX FOR ZERO TRUST CNAPP SOLUTION
   
   AccuKnox leading product combined with their successful track record of
   partnering with their customers forms the foundation for this objective. 
-
   Said by Glenn Kimball, Chief Information Security Officer, Clint Health.
   
   BECOME A PARTNER

SEARCH
GET A DEMO

Ask Ada

BETA

Gen-AI Based
Cloud Security


PROTECT CVE-2024-3094 XZ/LIBLZMA BACKDOOR ATTACKS WITH ACCUKNOX

by Rudraksh Pareek and Atharva Shah | April 03, 2024

This blog post discusses the xz/liblzma backdoor vulnerability (CVE-2024-3094)
and its unauthorized system access. We’ll go over the importance of runtime
security and introduce AccuKnox’s code to cloud security mechanisms, which
monitor library usage, audit access attempts, and prevent exploitation.

Reading Time: 5 minutes


TABLE OF CONTENTS

 * Compromised Versions
 * CVE-2024-3094 with CVE Score 10!
 * Why is Runtime Security Critical?
 * AccuKnox Solution
 * Securing SSH Access with AccuKnox
 * Monitoring Capabilities
 * Auditing Capabilities
 * Prevention Capabilities
 * Further Protection
 * Takeaways

Share This

 * 

A backdoor vulnerability (CVE-2024-3094) was recently discovered in the popular
Linux compression utility xz and its complementary library liblzma. This
backdoor was maliciously introduced by a trusted maintainer of the xz project
over nearly two years, making it a concerning software supply chain attack.
According to a report from Cybersecurity Ventures, the global annual cost of
cybercrime is expected to reach $10.5 trillion by 2025, highlighting the urgency
of addressing vulnerabilities like CVE-2024-3094.


COMPROMISED VERSIONS

The compromised versions of liblzma are v5.6.0 and v5.6.1. While these
compromised versions have not yet made their way into stable releases of major
Linux distributions, they were present in some testing and rolling-release
variants, putting those systems at risk.

Source: JFrog


CVE-2024-3094 WITH CVE SCORE 10!

Very few vulnerabilities have a perfect 10 score…this is one of those.One
notable exploit of this backdoor allows an attacker to gain unauthorized access
to a system by bypassing SSH (OpenSSH) authentication, a critical security
vulnerability.


WHY IS RUNTIME SECURITY CRITICAL?

To understand the importance of runtime security in this context, Let’s first
understand how an executable might use liblzma as a dependency: 

 1. Static linking – liblzma is imported and included at build time. 
 2. Dynamic linking – The executable accesses the liblzma shared object (.so)
    file present on the system at runtime.

While static analysis tools can help detect issues with statically linked
dependencies, they struggle to identify risks associated with dynamically linked
libraries, as the specific version used can vary across systems and
environments. This is where runtime security becomes crucial, as it allows for
the detection and prevention of compromised library versions during execution.


ACCUKNOX SOLUTION

AccuKnox is purpose-built to battle against such invasive threats. We secure
across environments, from cloud to bare metal, at multiple stages, including:

 1. Detecting the presence of compromised liblzma versions through vulnerability
    scanning.
 2. Auditing and preventing access to compromised liblzma versions at runtime.
 3. Monitoring and analyzing systems for any suspicious activity, even if they
    have already been compromised.


SECURING SSH ACCESS WITH ACCUKNOX

Consider the example of securing SSH access to compromised virtual machines
(VMs). The OpenSSH server (sshd) is a prime example of an executable that
dynamically links to liblzma at runtime. Powered by the open-source KubeArmor
project, AccuKnox can monitor and report the behavior of applications and system
processes running on Linux VMs or as containers in Kubernetes. This capability
is invaluable for detecting if a running SSH process is accessing any infected
versions of liblzma.

With KubeArmor’s inline mitigation approach, AccuKnox enforces user-defined
rules to restrict these activities, effectively blocking access to the
compromised liblzma shared object’s path.

Here’s a screengrab of a virtual machine with the compromised liblzma shared
object.


MONITORING CAPABILITIES

Once the VM is on boarded onto the AccuKnox SaaS platform and agents are
running, they start monitoring file access, process execution, network access,
and more. This monitoring is crucial for:

 1. Detecting if a system is using compromised versions of libraries.
 2. Identifying if a system has already been compromised and exhibiting
    unexpected activity.

If an attempt is made to access this VM over SSH, the liblzma version used by
the sshd process would be detected and reported. The screenshot below shows the
SSH process trying to access liblzma.so.5.6.0, the compromised version:


AUDITING CAPABILITIES

To further enhance security, AccuKnox allows the creation of policies to audit
when any process tries to access the malicious liblzma.so, enabling
administrators to take appropriate action and upgrade to a patched version of
xz.

This is the sample policy used to enforce security

apiVersion: security.kubearmor.com/v1
kind: KubeArmorHostPolicy
metadata:
  name: hsp-cve-2024-3094-xz-utils-v5-6-backdoor
spec:
  tags: ["CVE", "CVE-2024-3094", "remote-code-execution", "backdoor"]
  message: "Alert! A process accessed compromised versions of xz-utils and liblzma (v5.6.0, v5.6.1)."
  nodeSelector:
    matchLabels:
      # regex matching name of the VM that you want to secure
      kubearmor.io/hostname: xz-exploit-demo-vm
  file:
    # this will match any file containing liblzma.so.5.6.0 and audit
    # whenever a process tries to access it
    severity: 5
    matchPatterns:
    - path: "/**/liblzma.so.5.6.0.*"
    - path: "/**/liblzma.so.5.6.1.*"
    matchPaths:
    - path: /usr/lib/x86_64-linux-gnu/liblzma.so.5.6.0
    - path: /usr/lib/x86_64-linux-gnu/liblzma.so.5.6.1
    - path: /usr/lib/liblzma.so.5.6.0
    - path: /usr/lib/liblzma.so.5.6.1
  action: Audit




With this policy in place, users would still be able to access the VM, but an
audit alert would be generated whenever a process attempts to access the
compromised liblzma version.


PREVENTION CAPABILITIES

AccuKnox can take a more proactive approach by preventing processes from
accessing the compromised liblzma version altogether. To achieve this, the
action in the policy can be changed from Audit to Block. However, it’s important
to note that with this policy in effect, no one would be able to access the
server over SSH until the server is updated to use a patched version of
xz/liblzma. When attempting to access the server remotely with the “Block”
policy in place, SSH fails. This is highlighted below.



This is how the alert looks on the AccuKnox Enterprise CNAAP dashboard:


FURTHER PROTECTION

The policy shown above is just an example from AccuKnox’s curated set of policy
templates, which also includes hardening policies based on CVE databases, MITRE
ATT&CK techniques, NIST controls, and more. Along with hardening policies,
AccuKnox recommends implementing zero-trust policies based on your applications’
behavior, ensuring that processes in the system are granted the least privileged
access necessary.


TAKEAWAYS

 * CVE-2024-3094 is a critical vulnerability affecting v5.6.0 and v5.6.1 of
   xz/liblzma, as recognized by major advisory bodies.
 * Currently, only rolling-release Linux distributions are affected by this
   vulnerability.
 * Vulnerability scanning can be used to detect the presence of compromised
   versions within code and images.
 * Most executables dynamically link to liblzma, making runtime security
   essential for detecting, auditing, and preventing the execution of dependents
   using compromised versions.
 * Continuous runtime monitoring of systems can help detect any suspicious
   activity, whether compromised or not.

AccuKnox’s runtime security solution secures from code to cloud with a full
security tooling suite with Enterprise protection standards. We defend against
crypto-jacking, data science workload threats, escalated privilege access, and
other cloud-native application threats for you to proactively identify and
mitigate risks before they can be exploited.


MUST READ ARTICLES

 * Zero Trust (ZT) – The Future of Cloud Security
 * Zero Trust (ZT) Architecture, Framework and Model
 * Cloud Security Governance, Risk and Compliance (GRC)
 * How to Pick the Right CNAPP (Cloud Native Application Protection Platform)
   Vendor
 * What is Driving the Need for CSPM (Cloud Security Posture Management)
 * Agent vs Agentless Multi Cloud Security


YOU CANNOT SECURE WHAT YOU CANNOT SEE.

Your most sensitive information is stored on cloud and on premise
infrastructure. Protect what is most important from cyber attacks. Real-time
autonomous protection for your network's edges.

READY TO GET STARTED?

EXPLORE SYNERGIES


AccuKnox Zero Trust CNAPP Cloud Security protects Public clouds, Private clouds,
Kubernetes, VMs, Bare metals, IoT Edge, and 5G security.




AVAILABLE ON




PRODUCT

 * CNAPP
 * CSPM
 * CWPP
 * KIEM
 * 5G Security
 * IoT / Edge Security

RESOURCES

 * Videos
 * Presentations
 * Data Sheets
 * Blogs
 * White Papers
 * eBooks
 * Technical Papers
 * Product Collaterals
 * Help Documents

COMPANY

 * Mission & Vision
 * Leadership
 * Careers
 * Investors
 * Patents
 * Comparisons
 * Analyst Reports
 * Contact Us

Suite AG 138, SRI, 333 Ravenswood Ave, Menlo Park, CA 94025, USA

© Copyright 2020 – 2024 AccuKnox all rights reserved

| Terms of Use| Privacy Policy| Evaluation Agreement| SLA|