this post was submitted on 10 Jul 2023
135 points (97.9% liked)

Lemmy.World Announcements

29079 readers
252 users here now

This Community is intended for posts about the Lemmy.world server by the admins.

Follow us for server news 🐘

Outages 🔥

https://status.lemmy.world/

For support with issues at Lemmy.world, go to the Lemmy.world Support community.

Support e-mail

Any support requests are best sent to info@lemmy.world e-mail.

Report contact

Donations 💗

If you would like to make a donation to support the cost of running this platform, please do so at the following donation URLs.

If you can, please use / switch to Ko-Fi, it has the lowest fees for us

Ko-Fi (Donate)

Bunq (Donate)

Open Collective backers and sponsors

Patreon

Join the team

founded 2 years ago
MODERATORS
 

While I was asleep, apparently the site was hacked. Luckily, (big) part of the lemmy.world team is in US, and some early birds in EU also helped mitigate this.

As I am told, this was the issue:

  • There is an vulnerability which was exploited
  • Several people had their JWT cookies leaked, including at least one admin
  • Attackers started changing site settings and posting fake announcements etc

Our mitigations:

  • We removed the vulnerability
  • Deleted all comments and private messages that contained the exploit
  • Rotated JWT secret which invalidated all existing cookies

The vulnerability will be fixed by the Lemmy devs.

Details of the vulnerability are here

Many thanks for all that helped, and sorry for any inconvenience caused!

Update While we believe the admins accounts were what they were after, it could be that other users accounts were compromised. Your cookie could have been 'stolen' and the hacker could have had access to your account, creating posts and comments under your name, and accessing/changing your settings (which shows your e-mail).

For this, you would have had to be using lemmy.world at that time, and load a page that had the vulnerability in it.

top 50 comments
sorted by: hot top controversial new old
[–] LuckyLu@lemmy.world 28 points 1 year ago (9 children)

Very impressed by how quickly action has been taken by this and other instances to patch the issue.

[–] Darkard@lemmy.world 1 points 1 year ago* (last edited 1 year ago) (1 children)

Hijacking the top comment to say I had problems with logging in to Lemmy.world today and liftoff was failing in odd ways.

I had to go into my web browser and clear my site cookies for lemmy.world to let me log in there.

In liftoff I had to go into the app settings in android to clear the cache and then remove and re-add my account for it to be able to log me in. (Press and hold on the account to remove it)

[–] LuckyLu@lemmy.world 0 points 1 year ago (1 children)

I’m on iOS with the Memmy app. It’s a work in progress that’s officially unfinished so I’m not surprised but it has also been a bit buggy. Doesn’t seem that I can log out without deleting and reinstalling the app so hopefully this doesn’t happen too often XD

[–] Carnelian@lemmy.world 1 points 1 year ago

So I was actually just struggling with that myself, also in the Memmy app in case that isn’t clear

What I did was add my account (again)

There was no warning or anything, and it populated the list with two of me.

At that point, a “delete account” option appeared under both of them. So I guess in normal circumstances, it wants you to keep one account around at all times?

I deleted one of them, and the app basically reinitialized. Both were gone and it showed me the welcome screen.

I logged back in, and now everything is back to normal

[–] trouser_mouse@lemmy.world 1 points 1 year ago

Very, seems like great work.

load more comments (6 replies)
[–] ThisIsMyLemmyLogin@lemmy.world 23 points 1 year ago (3 children)

I wish hackers would invest their time in clearing credit card debt, deleting hospital fees, or something else that actually serves the public good, instead of hacking ordinary people just trying to get by.

[–] riskable@programming.dev 4 points 1 year ago (1 children)

Deleting hospital fees/debt is very dangerous... In many HUGE regions in the US there's only one hospital and if that hospital suddenly can't pay its bills it could shut down, leaving a whole lot of completely innocent people in a very sad, people-are-dying sort of state.

In fact, something like this already happened:

https://www.cbsnews.com/chicago/news/st-maragrets-health-central-illinois-hospital-closing/

Hospitals are special in that they're often evil organizations (not all though) that are some of the easiest to hack but also provide critical services to the most vulnerable. One should tread lightly. Political solutions are better (hack some politicians that are against healthcare reform instead).

Clearing credit card debt via hacking is nearly impossible but I agree it would be a much more ethical choice for hackers to target. I used to work for the credit card industry. My unique insider perspective, deep industry knowledge, and personal experience is here to let you know they suck. They are just as evil and unethical and unnecessary as everyone thinks they are! Seriously: If Visa, MasterCard, American Express, and all the lesser players suddenly disappeared the world would be a better place.

Before that can happen though people need a backup payment method that doesn't go through their systems and no: Cash won't work (there's not enough in circulation and it's dangerous to carry large amounts of it). The credit card companies know this threat exists which is why they lobbied Florida (and probably other states) to outlaw alternative, government-run forms of payment (e.g. central bank currency).

As soon as people have a widely accepted payment option that doesn't go through Visa and MasterCard's middlemen (e.g. First Data) then hackers can take their gloves off! Until then though... Let's keep the payment infrastructure working, OK? Thanks!

There's no limit to the amount of good deeds hackers can do though. So let's encourage that! For example, there's plenty of cartels and evil religious organizations (e.g. Taliban, ISIS, Mormon Church, Prosperity Gospel scam artists) that have plenty of money to spare and enormous attack surfaces 👍

[–] ReadyUser31@lemmy.world 2 points 1 year ago

Hospitals are special in that they’re often evil organizations

Just want to state the obvious and say, this is pretty much only the case in the US.

[–] TwoGems@lemmy.world 1 points 1 year ago* (last edited 1 year ago)
[–] vacuumflower@lemmy.sdf.org 0 points 1 year ago (1 children)

clearing credit card debt, deleting hospital fees, or something else that actually serves the public good,

Inflation does very clearly not serve the public good. That aside, causing havoc in banks and medical institutions would have other unpleasant effects.

[–] jarfil@lemmy.world 0 points 1 year ago (1 children)

How about cleaning the bottom 10%'s debt, with the earings from one week of the top 0.1%?

[–] vacuumflower@lemmy.sdf.org 0 points 1 year ago (2 children)

Ah, you mean unauthorized "redistribution", not unauthorized "vanishing debt".

Technically should do less harm in terms of inflation, but money lying around is different from money being used, so there'll still be an increase in inflation.

The part about causing havoc - kinda same, there may not be direct inconsistencies as in the initial variant, but there'll still be some confusion due to the "top 0.1%" possibly being petty and trying to get their money back.

I frankly prefer changing the rules so that there'd be fewer artificial barriers for competition and economic efficiency to this. Say, patent law and trademark laws and IP laws have basically outgrown their usefulness and are now just a plague. Same with various licenses and practices for medical/pharmaceutical stuff (I know that things should be tested and an average person can't tell a hoax from a normal thing, just entities doing certification shouldn't be able to block stuff which would then be used to create oligopolies). Same with telecom. And so on.

Except for air traffic, water traffic, road traffic and radio, of course. Not regulating those would mean, eh, real havoc.

load more comments (2 replies)
[–] wazoobonkerbrain@lemmy.world 14 points 1 year ago (2 children)

IMPORTANT ANNOUNCEMENT: My account was not among those hacked. Any random bullshit appearing in my post/comment history was written by me.

[–] Powof@pawb.social 1 points 1 year ago

That’s something a hacker would say.

load more comments (1 replies)
[–] TheVampireSaga@lemmy.world 4 points 1 year ago (1 children)

what steps are being taken to ensure it doesn't happen again? was any personal data compromised for users?

[–] ruud@lemmy.world 4 points 1 year ago (6 children)

Good point, I'll update the post.

[–] BustedPancake@lemmy.world 1 points 1 year ago (5 children)

So all our cookies are negated now with the JWT changed, and we just needed to login again? Can attackers have stolen our cookies in order to use our accounts to post as if it was us? I'm sure they were only interested in admin cookies, so most others were "useless" to them? I see nothing wrong with my posts so I should be safe, right?

[–] cantevencode@lemmy.world 1 points 1 year ago

Prior to the JWT secret being rotated, yes, they could have authenticated as you. The tokens are now all invalid and useless

load more comments (4 replies)
load more comments (4 replies)
[–] Sam1232188@lemmy.world 3 points 1 year ago

Thank the heavens the meme community stayed safe through this without my daily dose of cybersecurity memes idk how I would function ;)

[–] Ahmed@lemmy.world 2 points 1 year ago

Thanks Ruud for fixing it! Just a reminder guys that If you are using a third party app you need to login again.

[–] fikran@thebag.social 1 points 1 year ago

Ugh, people should not go after systems trying to give a free service to the internet. It just ruins everything.

[–] irkli@lemmy.world 1 points 1 year ago

That shit sucks, I'm so sorry. I'm glad you got it under control. Nothing but admiration from me for doing all this hard work.

New code, new challenges. It's a new world out there and largely is pretty great. Thanks again.

[–] ulu_mulu@lemmy.world 1 points 1 year ago

Amazing how you quickly reacted to this!! Bravo!!

TIP: if you can't login after what happened, clear out your browser cache including ALL cookies, that fixes it (it did for me at least). I believe it's also advisable to change lemmy password.

[–] dr_scientist@lemmy.world 1 points 1 year ago

Good job. I don't understand very much of that, so that makes me all the more grateful. Thank you.

[–] Notsosupermario@lemmy.world 1 points 1 year ago

Thanks for fixing and being so open about it

[–] hacktheegg@programming.dev 1 points 1 year ago

Huh, i think i got lucky by forgetting that there is something i can consume other than youtube

[–] trouser_mouse@lemmy.world 1 points 1 year ago* (last edited 1 year ago)

First - really good summary and sounds like everyone is working hard.

Cross posting the below comment.

Under GDPR if you have had a data breach you have a legal obligation to assess whether you need to report it and you must make the report within 72 hours of discovering the breach.

There are other types of reportable breaches too, I only mention data as it sounds most likely. You may or may not be subject to PECR which may also have been breached although less likely. I don’t really have enough familiarity with the regulation to discuss that one.

If you are not sure if there has been a breach you may also need to discuss it with the relevant body or make a report.

Please can you update what action you have taken regarding this and if the incident was reportable or not and the reasons why. Edit - from that new information, it sounds like this is a reportable breach.

For a full understanding, it would be good to know if you had 2FA enabled on the compromised account particularly as it had admin privileges and if so how 2FA was circumvented with this exploit.

It would also be good to know what measures you have in place to prevent the same or other malicious attempts on your Open Collective and Patreon accounts as issues with those are potentially more serious. They may not be vulnerable to this, but it is going to be reassuring to know there is good security practice, 2FA protection etc enabled and you have robust procedures in place.

[–] AlmightySnoo@lemmy.world 0 points 1 year ago* (last edited 1 year ago) (6 children)

Do we have any details on how Michelle's account was compromised? Right now in the GitHub issue about the vulnerability they're clueless about how the custom emoji exploit could be performed without first an already compromised admin account.

EDIT: yeah here's how: https://github.com/LemmyNet/lemmy-ui/issues/1895#issuecomment-1629326627

You do NOT need an admin account to do that. Any normal user could have done that.

load more comments (6 replies)
[–] binary45@lemmy.world 0 points 1 year ago (1 children)

Is that why I got logged off?

[–] mayo@lemmy.world 1 points 1 year ago* (last edited 1 year ago)

Yes.

Also it looks like some images from posts are kind of gone

load more comments
view more: next ›