This week in security: A sophisticated Linux backdoor, FBI data purchases, and rapid exploits

April 2, 20262 min read2 sources
Share:
This week in security: A sophisticated Linux backdoor, FBI data purchases, and rapid exploits

A series of distinct security events this week highlight systemic risks, from foundational software to federal surveillance and enterprise hardware. The incidents demonstrate how deeply embedded threats can go undetected and how quickly newly discovered flaws are weaponized.

The most significant event was the discovery of a sophisticated backdoor (CVE-2024-3094) in XZ Utils, a data compression library used in major Linux distributions. Security researchers uncovered a multi-year social engineering campaign by a malicious actor who became a trusted project maintainer, ultimately inserting code that could have allowed remote system takeovers. The backdoor was discovered by chance before it reached stable production systems, narrowly averting a widespread supply chain disaster.

On the privacy front, debate continues over government agencies purchasing commercially available location data. Reports confirm the FBI and others acquire vast datasets from data brokers to track individuals without a warrant, exploiting a legal loophole. This practice highlights how personal data collected by everyday apps can be used for surveillance. While tools like a VPN can help obscure a user's IP address, they don't prevent data collection by apps with location permissions. In a positive development for user privacy, WhatsApp began rolling out usernames, allowing users to connect without sharing their phone numbers.

Meanwhile, the speed of exploitation for newly disclosed vulnerabilities remains a critical challenge. Attackers began actively exploiting a chain of critical flaws in Ivanti Connect Secure VPN gateways almost immediately after their public disclosure. The Cybersecurity and Infrastructure Security Agency (CISA) issued multiple emergency directives as state-sponsored and criminal groups used the flaws to breach networks. This pattern mirrors the long-standing problem of insecure Internet of Things (IoT) devices, which are often compromised within minutes of being connected to the internet, underscoring the need for rapid patching of all internet-facing systems.

Share:

// SOURCES

// RELATED

Geofence warrants on trial: The Supreme Court weighs privacy against policing

The Supreme Court is considering Chatrie v. United States, a case that will decide if geofence warrants—digital dragnets of location data—are constitu

7 min readApr 23

FISA Section 702 renewed for two years after contentious congressional battle

A contentious legislative battle ends with a two-year renewal of the controversial FISA Section 702 surveillance program, side-stepping major privacy

6 min readApr 20

Google's war on bad ads escalates as Android 17 promises major privacy overhaul

Google's latest report reveals a massive crackdown, blocking 8.3 billion malicious ads in 2025, while preparing a major privacy overhaul for Android 1

6 min readApr 18

The surveillance law Congress can’t quit — and can’t explain

Despite a 2024 overhaul with 56 amendments, Section 702 of FISA remains deeply controversial as supporters and critics cannot even agree on its scope.

7 min readApr 18