Uh, did Lemmy.world get hacked?
When logging into lemmy.world the banner now says "Israel - ni**a style" (full word unredacted) and it starts linking to lemon party and a bunch of other NSFW sites.
When logging into lemmy.world the banner now says "Israel - ni**a style" (full word unredacted) and it starts linking to lemon party and a bunch of other NSFW sites.
Yea. Looks like they are working on it:
EDIT: Looks like things are starting to resolve.
EDIT 2: MichelleG account admin was restored and she posted and update but shortly after the changes happened again. Her account is likely still compromised with someone else accessing things via it.
EDIT 3: lemmy.world back online. MichelleG has again been removed as admin. Most things appear to have been cleaned up. Blocked instances still need to be fixed however.
Worse. Admin account. The MichelleG account is an admin and it appears that it was compromised and is what is causing all the problems. It looks like they have removed it from admin so things wont get worse but they will likely take a bit to find and repair all the stupid little changes that were made.
The sidebar was changed.
Obviously some javascript was installed to the frontpage that makes us redirect to lemon party (NSFW) ponographic site.
Logo on top of the screen has changed, anti-Israel has been plastered all over the place.
This is not inspiring confidence in their security. 2FA was off or was somehow circumvented.
We'll see what they say but never a bad idea. Hopefully logins are encrypted and salted but I don't use this username or password anywhere else.
That's the ideal situation. It's been restored and I'm yet to see anything related to 'login credentials being compromised' or an advice to change them but as you said, it's not a bad idea. Safety first
Yeah the admins have said they're hands off and all but one person managing the world community isn't active since ruud doesn't check his notifications.
Somewhat concerning tbh
'cause a Liz Lemon party is mandatory!
(That was one of my favorite lines. Loved that show.)
Damn that's a nostalgia trip. Haven't seen lemon party in a long time. Early internet was full of links to it.
I kinda would believe meta doing it, tho. Only in purely conspiracy theorist levels, but it kinda is a possibility...
Kind of annoying that someone can just brick the entire server like this. I keep getting redirected just trying to get to the main page
nah. they don't. mine didn't loaded anything anymore and couldn't do anything anymore. can't even open my messages anymore.
Also on liftoff with no issues. Got here after seeing something about a hack in another thread.
Jerboa.
had the old cached content but didn't loaded anything new anymore. click on pms didn't do anything, but there was a weird injected image on my home feed everytime i opened the app that looked to me like injected code (did the hacker onject js code that generated this weird post? looked like it).
The main page has a Javascript redirection or something. The hacked admin account must have added it. As soon as that loads, we get redirected.
Even an admin account should probably not be able to inject Javascript. Something a little sloppy going on there.
The former, he mad because people are fed up with the shit of people like him on reddit
Based on the Github / Rudd's new post, it looks like there was an "Evil Post" that contained a Markdown-to-Javascript escape and actually allowed the hacker to run Javascript in our web-browsers. Something to do with custom emojis?
So the problem was multi-fold.
The hacker created the "Evil Post", which constantly was stealing people's cookies. Anyone who viewed the evil post in a web browser (Chrome/Firefox/Edge) allowed the hacker to have access to their account (and anything you can do in the web browsers).
The hacker waited until an admin viewed the post. Then took control of the administrator's account, and likely a few other people's accounts as well. DMs containing the evil-Javascript post were sent to various moderators.
Hacker used the account access to just troll us.
Fixing #3 doesn't fix #2 or #1. So eventually, when #3 was fixed, the hacker just grabbed the admin-account and made everything back to the way it was.
The problem wouldn't be fixed permanently until #3, #2, and #1 were all fixed. Which they seem to be fixed now. But this "evil post" is going around the Federation. Other Lemmy-instances may have the post cached, and the users on those lemmies will likely have their JWT cookie also stolen (allowing the hacker to take over people's accounts those instances in a similar manner)
still having this problem, at least we are aware that this could happen down the road as an early warning
It was circumvented hours prior to the attack. I tried activating but there's no feedback
Personally I don't use 2fa even though I want to. I use bitwarden for everything and I have no way to set up 2fa inside bitwarden. I can set it up through authy but prefer not to.
Narrator voiceover: In today's lesson @ExcursionInversion learns that the world is not the USA and vice versa.
What's the price in RMB and do they take payment by WeChat Wallet or Alipay?
Oh, what's that? You don't know what any of that even is?
Perhaps you're not in a position to say "come on" then. Given that the site doesn't even have i18n for the overwhelming majority of world languages, I'm pretty confident in guessing they don't support a whole lot of payment options accessible to the bulk of the world as well.
In case you are actually interested. https://bitwarden.com/help/billing-faqs/#q-what-payment-options-do-you-accept-for-customers-outside-the-united-states
So they don't accept payment in RMB over AliPay or Wechat is what you're saying?
What. A. Surprise.
Credit cards are incredibly unpopular here: I've literally not seen one in use that wasn't by a tourist in a tourist-oriented shop in 20 years. "Debit card" is so vague it's almost charming. Paypal isn't easily available as an option in most of the world. (I, for example, to use Paypal, would have to jump through incredibly time-consuming and expensive hoops to use its 'letter of credit' option.) I don't know what "ACH" is, but I can pretty much guarantee that I can't pay from my bank account given the currency export restrictions, etc. etc. etc. etc.
So again: today's lesson was "the world is not the USA and vice versa".
I have 2fa working in bitwarden for some places. I do pay for a subscription though, not sure if that makes a difference
I use it everywhere but Lemmy because for whatever reason the link to set it up won't give me a manual code or QR code it forces me to open it in an ap like Authy or Google Auth. Those are just the ones I have installed I'm sure others would work as well.
Yea for your average user I can get that, but this was an admin account. Sounds like 2FA was already compromised so will be interesting to understand how that happened in the first place.
It doesn't even have to be 2FA. Linux Tech Tips got their channels hacked through a malware that targeted a user's session tokens that keep the user logged in to their Youtube channels.