While I was asleep, apparently the site was hacked. Luckily, (big) part of the lemmy.world team is in US, and some early birds in EU also helped mitigate this.

As I am told, this was the issue:

  • There is an vulnerability which was exploited
  • Several people had their JWT cookies leaked, including at least one admin
  • Attackers started changing site settings and posting fake announcements etc

Our mitigations:

  • We removed the vulnerability
  • Deleted all comments and private messages that contained the exploit
  • Rotated JWT secret which invalidated all existing cookies

The vulnerability will be fixed by the Lemmy devs.

Details of the vulnerability are here

Many thanks for all that helped, and sorry for any inconvenience caused!

Update While we believe the admins accounts were what they were after, it could be that other users accounts were compromised. Your cookie could have been ‘stolen’ and the hacker could have had access to your account, creating posts and comments under your name, and accessing/changing your settings (which shows your e-mail).

For this, you would have had to be using lemmy.world at that time, and load a page that had the vulnerability in it.

  • LuckyLu@lemmy.world
    link
    fedilink
    arrow-up
    22
    ·
    1 year ago

    Very impressed by how quickly action has been taken by this and other instances to patch the issue.

    • Darkard@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      1 year ago

      Hijacking the top comment to say I had problems with logging in to Lemmy.world today and liftoff was failing in odd ways.

      I had to go into my web browser and clear my site cookies for lemmy.world to let me log in there.

      In liftoff I had to go into the app settings in android to clear the cache and then remove and re-add my account for it to be able to log me in. (Press and hold on the account to remove it)

      • LuckyLu@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        I’m on iOS with the Memmy app. It’s a work in progress that’s officially unfinished so I’m not surprised but it has also been a bit buggy. Doesn’t seem that I can log out without deleting and reinstalling the app so hopefully this doesn’t happen too often XD

        • Carnelian@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          So I was actually just struggling with that myself, also in the Memmy app in case that isn’t clear

          What I did was add my account (again)

          There was no warning or anything, and it populated the list with two of me.

          At that point, a “delete account” option appeared under both of them. So I guess in normal circumstances, it wants you to keep one account around at all times?

          I deleted one of them, and the app basically reinitialized. Both were gone and it showed me the welcome screen.

          I logged back in, and now everything is back to normal

  • ThisIsMyLemmyLogin@lemmy.world
    link
    fedilink
    arrow-up
    15
    ·
    1 year ago

    I wish hackers would invest their time in clearing credit card debt, deleting hospital fees, or something else that actually serves the public good, instead of hacking ordinary people just trying to get by.

    • Riskable@programming.dev
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      Deleting hospital fees/debt is very dangerous… In many HUGE regions in the US there’s only one hospital and if that hospital suddenly can’t pay its bills it could shut down, leaving a whole lot of completely innocent people in a very sad, people-are-dying sort of state.

      In fact, something like this already happened:

      https://www.cbsnews.com/chicago/news/st-maragrets-health-central-illinois-hospital-closing/

      Hospitals are special in that they’re often evil organizations (not all though) that are some of the easiest to hack but also provide critical services to the most vulnerable. One should tread lightly. Political solutions are better (hack some politicians that are against healthcare reform instead).

      Clearing credit card debt via hacking is nearly impossible but I agree it would be a much more ethical choice for hackers to target. I used to work for the credit card industry. My unique insider perspective, deep industry knowledge, and personal experience is here to let you know they suck. They are just as evil and unethical and unnecessary as everyone thinks they are! Seriously: If Visa, MasterCard, American Express, and all the lesser players suddenly disappeared the world would be a better place.

      Before that can happen though people need a backup payment method that doesn’t go through their systems and no: Cash won’t work (there’s not enough in circulation and it’s dangerous to carry large amounts of it). The credit card companies know this threat exists which is why they lobbied Florida (and probably other states) to outlaw alternative, government-run forms of payment (e.g. central bank currency).

      As soon as people have a widely accepted payment option that doesn’t go through Visa and MasterCard’s middlemen (e.g. First Data) then hackers can take their gloves off! Until then though… Let’s keep the payment infrastructure working, OK? Thanks!

      There’s no limit to the amount of good deeds hackers can do though. So let’s encourage that! For example, there’s plenty of cartels and evil religious organizations (e.g. Taliban, ISIS, Mormon Church, Prosperity Gospel scam artists) that have plenty of money to spare and enormous attack surfaces 👍

  • Vamp@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    1 year ago

    what steps are being taken to ensure it doesn’t happen again? was any personal data compromised for users?

      • BustedPancake@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        So all our cookies are negated now with the JWT changed, and we just needed to login again? Can attackers have stolen our cookies in order to use our accounts to post as if it was us? I’m sure they were only interested in admin cookies, so most others were “useless” to them? I see nothing wrong with my posts so I should be safe, right?

        • cantevencode@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          Prior to the JWT secret being rotated, yes, they could have authenticated as you. The tokens are now all invalid and useless

        • Rooki@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          1 year ago

          If you think they could change your password:

          YES, they could.

          They could have changed the email => “Forgot PW” and with that you lost ur account.

          • Xero@lemmy.world
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            1 year ago

            I think I’ve lost my account, I clicked Forgot Password and nothing came into my mailbox. This account is the one I made just now.

            My old account:

            If you see that account post or comment on anything, please report it

            Edit: Nvm, I use another email to sign up for Lemmy and forgot about it

              • Xero@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                1 year ago

                actually nevermind, I forgot that I use a different email for Lemmy, I can log back in now

  • wazoobonkerbrain@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    IMPORTANT ANNOUNCEMENT: My account was not among those hacked. Any random bullshit appearing in my post/comment history was written by me.

  • Ahmed@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    Thanks Ruud for fixing it! Just a reminder guys that If you are using a third party app you need to login again.

  • irkli@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    That shit sucks, I’m so sorry. I’m glad you got it under control. Nothing but admiration from me for doing all this hard work.

    New code, new challenges. It’s a new world out there and largely is pretty great. Thanks again.

  • Sam1232188@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    Thank the heavens the meme community stayed safe through this without my daily dose of cybersecurity memes idk how I would function ;)

  • trouser_mouse@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    1 year ago

    First - really good summary and sounds like everyone is working hard.

    Cross posting the below comment.

    Under GDPR if you have had a data breach you have a legal obligation to assess whether you need to report it and you must make the report within 72 hours of discovering the breach.

    There are other types of reportable breaches too, I only mention data as it sounds most likely. You may or may not be subject to PECR which may also have been breached although less likely. I don’t really have enough familiarity with the regulation to discuss that one.

    If you are not sure if there has been a breach you may also need to discuss it with the relevant body or make a report.

    Please can you update what action you have taken regarding this and if the incident was reportable or not and the reasons why. Edit - from that new information, it sounds like this is a reportable breach.

    For a full understanding, it would be good to know if you had 2FA enabled on the compromised account particularly as it had admin privileges and if so how 2FA was circumvented with this exploit.

    It would also be good to know what measures you have in place to prevent the same or other malicious attempts on your Open Collective and Patreon accounts as issues with those are potentially more serious. They may not be vulnerable to this, but it is going to be reassuring to know there is good security practice, 2FA protection etc enabled and you have robust procedures in place.

  • Ulu-Mulu-no-die@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Amazing how you quickly reacted to this!! Bravo!!

    TIP: if you can’t login after what happened, clear out your browser cache including ALL cookies, that fixes it (it did for me at least). I believe it’s also advisable to change lemmy password.

  • Victor Gnarly@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    1 year ago

    Had to clear my browser catch to log in, Jerboa still shows as not logged in even after logging out which you do by clicking the hamburger menu then click the top banner to change/log out of accounts. This post is a test to see if my account works again via browser lol.

    Edit: clearing app data/cache for Jerboa fixed the login issue.

        • UnicornKitty@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          1 year ago

          I login to Jerboa and it acts like I haven’t logged in. So I can’t login then logout. I cleared cache but it didn’t help.

          • pleasemakesense@lemmy.world
            link
            fedilink
            arrow-up
            0
            arrow-down
            1
            ·
            1 year ago

            I don’t know exactly what I did but I think it was I went to profile (which showed my as account logged in), then clicked the anonymous bar to go to accounts and there was an option to log out.

    • RealFknNito@lemmy.world
      link
      fedilink
      arrow-up
      0
      arrow-down
      2
      ·
      1 year ago

      Thanks for this comment, I had to wipe cache and cookies to login on desktop. Wasn’t sure what was preventing me from logging in.