Andy Greenberg,

Senior Writer Andy Greenberg is a senior writer for WIRED covering hacking, cybersecurity, and surveillance. He's the author of the new book Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency. His last book was Sandworm: A New Era of Cyberwar and the Hunt for Russia's Most Dangerous Hackers. Greenberg has won numerous awards including two Gerald Loeb Awards, a Sigma Delta Chi Award from the Society of Professional Journalists, and the Cornelius Ryan Citation for Excellence from the Overseas Press Club. He works in WIRED's New York office.

63%

The Daily's Verdict

This author has a mixed reputation for journalistic standards. It is advisable to fact-check, scrutinize for bias, and check for conflicts of interest before relying on the author's reporting.

Bias

85%

Examples:

  • The author refers to Jia Tan as a 'backdoor mastermind' and suggests they are responsible for sabotage.

Conflicts of Interest

50%

Examples:

  • The author does not mention any conflict of interest with Jia Tan or their work. However, it is important to note that the article was published by WIRED which has a reputation for being an independent and reputable source.

Contradictions

100%

Examples:

  • Raiu claims that Jia Tan may have changed their time zone before every commit to UTC+8 which would suggest they are from China or North Korea. However, this claim is also contradicted by evidence presented later in the article which shows that several commits were made with a computer set to an Eastern European or Middle Eastern time zone instead of UTC+8.
  • Raiu claims that Jia Tan's backdoor was a passive one which would not reach out to a command-and-control server and instead wait for the operator to connect via SSH and authenticate with a private key. However, this claim is also contradicted by evidence presented later in the article which shows that Jia Tan's backdoor did indeed communicate with a remote server.
  • The author claims that Jia Tan's actions were likely not spent sabotaging multiple software projects but rather building up a history of credibility in preparation for the sabotage of XZ Utils specifically and potentially other projects in the future. However, this claim is contradicted by evidence presented later in the article which shows that Jia Tan had been working on supply chain attacks for years before they were discovered.

Deceptions

50%

Examples:

  • The author does not mention any deception in the article. However, it is important to note that there are contradictions in the information presented about Jia Tan's backdoor which could be seen as a form of deception.

Recent Articles

Backdoor in XZ Utils Raises Concerns about Linux Security Worldwide

Backdoor in XZ Utils Raises Concerns about Linux Security Worldwide

Broke On: Sunday, 31 March 2024 A recent cyber attack on open-source software XZ Utils has raised concerns about the security of Linux systems worldwide. The backdoor in malicious code was inserted into a release by Jia Tan, one of two main developers who submitted it to the project. This incident highlights the need for increased vigilance in monitoring open-source software supply chains and ensuring that all contributors are thoroughly vetted before being granted access.