this post was submitted on 10 Jul 2023
199 points (98.5% liked)

Memmy - An iOS client for Lemmy

5087 readers
1 users here now

Download on the App Store

View on GitHub

Join the Discord

Code of Conduct

founded 1 year ago
MODERATORS
199
submitted 1 year ago* (last edited 1 year ago) by gkd@lemmy.ml to c/memmy@lemmy.ml
 

Note

This information is based off of early reports I have seen. I don't claim to know the extent to which any damage was done and as such recommend a password reset (two-factor authentication would not be of use if authentication tokens were compromised), but we do know that this was a Javascript injection.

Update

As of right now, it seems that the vulnerability should have only exposed JWTs, which have been invalidated by those instance administrators. I'd still recommend a password rotation just because, but you should be alright.

==========

With the recent Lemmy.world incident, I'd like to update you all. This vulnerability could not have affected you had you been using only Memmy while browsing. It was a Javascript injection, and as Memmy does not execute any Javascript, there is no attack surface here.

The only case where this could have affected you would be if you had been signed in to your account inside of the in-app browser or the default browser and opened one of these posts. That however would not be something with Memmy itself, but rather the accessing of the PWA.

Regardless, as we don't actually know what happened, I'd recommend changing passwords. If any JWTs were compromised during this, regardless of 2FA status these tokens could be used to authenticate with your account.

From what I have seen, this was an issue that was limited to Lemmy.world, as supposedly they were running a custom frontend build. Other than that, I don't know anything else.

Also, for the record, there is only one instance in this application where a webview is used, which is when viewing the terms of service which simply loads a local file from the app assets.

Any questions, I'll try to answer them but you'd be better off asking people more knowledgeable about the incident.

As always, this is a good time to go over your online security practices.

It is strongly recommended that you use a password manager such as Bitwarden or 1Password if you do not use one already. This can help prevent credential surfing if you have used the same password over many sites, preventing you from having several of your accounts breached from a single breach.

If you have used a password on Lemmy.world that you have used on other sites, you should change those other sites passwords immediately.

Email addresses may have been breached during the attack and this may result in increased spam and phishing emails. It is strongly advised that you throughly verify any emails that you receive after this, particularly ones relating to login requests, messages from banks or payment providers, such as PayPal or government institutions.

Thank you for using Memmy and stay safe!

you are viewing a single comment's thread
view the rest of the comments
[–] TWeaK@lemm.ee 17 points 1 year ago (2 children)

Is the attack ongoing still, or has it been patched?

[–] gkd@lemmy.ml 23 points 1 year ago

I don't have an answer to that. Lemmy.world is offline and lemmy.blahaj.zone is currently displaying a broken YouTube video. Other than that, I know nothing besides the chatter going on in the Lemmy Matrix.

[–] maegul@lemmy.ml 4 points 1 year ago

I think the safest approach right now is to stay off an instance that you have an account on, check for info in threads without being logged in or on instances you don't have an account on and wait until it seems things have been cleared up or your instance can verify that they're ok.

It seems people are zero-ing in on the problem, so it might not take long before instance admins can say whether their instances are fine or not.