Cyber Blog
ACH - XZ Backdoor
James | 18 April 2025
Who Was Behind the XZ Backdoor? A Threat Attribution Exercise Using ACH Recently in class, Alex (classmate) and I worked on a threat attribution excersice using the Analysis of Competing Hypotheses (ACH) method. The focus? One of the most intriguing real-world incidents of 2024: the XZ backdoor — a stealthy supply chain compromise that could have impacted countless Linux systems worldwide.
read more