Damn, it is actually scary that they managed to pull this off. The backdoor came from the second-largest contributor to xz too, not some random drive-by.
Well the account is focused on one particular project which makes sense if you expect to get burned at some point and don't want all your other exploits to be detected. It looks like there was a second sock puppet account involved in the original attack vector support code.
We should certainly audit other projects for similar changes from other psudoanonymous accounts.
Time to audit all their contributions although it looks like they mostly contribute to xz. I guess we'll have to wait for comments from the rest of the team or if the whole org needs to be considered comprimised.
The "Team" seems to be one other overworked dude with mental health issues. Hope he's well. I think this circumstance made xz a good target for such an attack.
I don't have a source but I think it is safe to say given the large corporations and government institutions that rely on XZ utils. I'm sure Microsoft, Amazon, redhat ect are in talks with the federal government about this