threatintel
actor tracker
All actors

Jia Tan

jia-tan · primary source: Other · first observed 2021 · last observed 2024
?? · UnknownState-sponsoredUnattributed

Persona behind a multi-year software supply-chain operation targeting xz-utils, a widely-deployed open-source data-compression library. The 'Jia Tan' account contributed to xz-utils from October 2021, steadily building credibility and commit access before inserting a sophisticated backdoor in versions 5.6.0 and 5.6.1 (CVE-2024-3094, CVSS 10.0). The backdoor, discovered on 29 March 2024 by Andres Freund, modified liblzma to intercept SSH RSA key authentication on affected systemd-linked Linux systems, enabling unauthorized remote access to any host running the compromised package. Multiple researchers assessed the operation as state-sponsored based on its sophistication and multi-year patience, but no public attribution to a specific government has been made.

Aliases

JiaT75Other

Motivations

espionagepre-positioning

Target sectors

technologylinux infrastructure

Target countries

USDEGBFRCAJP

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • Jia Tan
  • Unknown
  • espionage
  • pre-positioning
Infrastructure
Victim
  • technology
  • linux infrastructure
  • US
  • DE
  • GB

MITRE ATT&CK techniques

Timeline

0 events
No timeline events recorded yet.

Indicators of compromise

0 indicators
No indicators of compromise have been cataloged for this actor yet.

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). Jia Tan — actor profile. Retrieved from https://threatintel.local/actors/jia-tan

no cited activity