Why did the xz-tools attacker put so much effort into hiding the malware when they could manipulate the tarball?
With all the discussion about the xz-tools supply chain attack on the Linux distros, what confuses me:
As stated here or on the infographic here, the attackers worked their way to becoming trusted maintainers of the project. They used this… Continue reading Why did the xz-tools attacker put so much effort into hiding the malware when they could manipulate the tarball?