When logging into lemmy.world the banner now says “Israel - ni**a style” (full word unredacted) and it starts linking to lemon party and a bunch of other NSFW sites.

  • nosut@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    1 year ago

    Yea. Looks like they are working on it:

    EDIT: Looks like things are starting to resolve.

    EDIT 2: MichelleG account admin was restored and she posted and update but shortly after the changes happened again. Her account is likely still compromised with someone else accessing things via it.

    EDIT 3: lemmy.world back online. MichelleG has again been removed as admin. Most things appear to have been cleaned up. Blocked instances still need to be fixed however.

      • nosut@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        Worse. Admin account. The MichelleG account is an admin and it appears that it was compromised and is what is causing all the problems. It looks like they have removed it from admin so things wont get worse but they will likely take a bit to find and repair all the stupid little changes that were made.

        • dragontamer@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          1 year ago

          The sidebar was changed.

          Obviously some javascript was installed to the frontpage that makes us redirect to lemon party (NSFW) ponographic site.

          Logo on top of the screen has changed, anti-Israel has been plastered all over the place.

              • PabloPicasshole@lemmy.world
                link
                fedilink
                arrow-up
                0
                ·
                1 year ago

                We’ll see what they say but never a bad idea. Hopefully logins are encrypted and salted but I don’t use this username or password anywhere else.

                • MysticJorge@lemmy.world
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  1 year ago

                  That’s the ideal situation. It’s been restored and I’m yet to see anything related to ‘login credentials being compromised’ or an advice to change them but as you said, it’s not a bad idea. Safety first

        • Vamp@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          Yeah the admins have said they’re hands off and all but one person managing the world community isn’t active since ruud doesn’t check his notifications.

          Somewhat concerning tbh

  • Sarranti@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    Kind of annoying that someone can just brick the entire server like this. I keep getting redirected just trying to get to the main page

      • Cyyy@lemmy.world
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        1 year ago

        nah. they don’t. mine didn’t loaded anything anymore and couldn’t do anything anymore. can’t even open my messages anymore.

  • dx1@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    Even an admin account should probably not be able to inject Javascript. Something a little sloppy going on there.

      • dragontamer@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        1 year ago

        Based on the Github / Rudd’s new post, it looks like there was an “Evil Post” that contained a Markdown-to-Javascript escape and actually allowed the hacker to run Javascript in our web-browsers. Something to do with custom emojis?

        So the problem was multi-fold.

        1. The hacker created the “Evil Post”, which constantly was stealing people’s cookies. Anyone who viewed the evil post in a web browser (Chrome/Firefox/Edge) allowed the hacker to have access to their account (and anything you can do in the web browsers).

        2. The hacker waited until an admin viewed the post. Then took control of the administrator’s account, and likely a few other people’s accounts as well. DMs containing the evil-Javascript post were sent to various moderators.

        3. Hacker used the account access to just troll us.


        Fixing #3 doesn’t fix #2 or #1. So eventually, when #3 was fixed, the hacker just grabbed the admin-account and made everything back to the way it was.

        The problem wouldn’t be fixed permanently until #3, #2, and #1 were all fixed. Which they seem to be fixed now. But this “evil post” is going around the Federation. Other Lemmy-instances may have the post cached, and the users on those lemmies will likely have their JWT cookie also stolen (allowing the hacker to take over people’s accounts those instances in a similar manner)

  • Kainsley@lemmy.world
    link
    fedilink
    arrow-up
    0
    arrow-down
    1
    ·
    1 year ago

    Surely 2FA must have been off for that to happen, if so that doesn’t inspire confidence…

    • Trapping5341@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      Personally I don’t use 2fa even though I want to. I use bitwarden for everything and I have no way to set up 2fa inside bitwarden. I can set it up through authy but prefer not to.

      • Chocrates@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        I have 2fa working in bitwarden for some places. I do pay for a subscription though, not sure if that makes a difference

        • Trapping5341@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          I use it everywhere but Lemmy because for whatever reason the link to set it up won’t give me a manual code or QR code it forces me to open it in an ap like Authy or Google Auth. Those are just the ones I have installed I’m sure others would work as well.

        • ttmrichter@lemmy.world
          link
          fedilink
          arrow-up
          1
          arrow-down
          2
          ·
          1 year ago

          Narrator voiceover: In today’s lesson @ExcursionInversion learns that the world is not the USA and vice versa.

          What’s the price in RMB and do they take payment by WeChat Wallet or Alipay?

          Oh, what’s that? You don’t know what any of that even is?

          Perhaps you’re not in a position to say “come on” then. Given that the site doesn’t even have i18n for the overwhelming majority of world languages, I’m pretty confident in guessing they don’t support a whole lot of payment options accessible to the bulk of the world as well.

            • ttmrichter@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              1 year ago

              So they don’t accept payment in RMB over AliPay or Wechat is what you’re saying?

              What. A. Surprise.

              Credit cards are incredibly unpopular here: I’ve literally not seen one in use that wasn’t by a tourist in a tourist-oriented shop in 20 years. “Debit card” is so vague it’s almost charming. Paypal isn’t easily available as an option in most of the world. (I, for example, to use Paypal, would have to jump through incredibly time-consuming and expensive hoops to use its ‘letter of credit’ option.) I don’t know what “ACH” is, but I can pretty much guarantee that I can’t pay from my bank account given the currency export restrictions, etc. etc. etc. etc.

              So again: today’s lesson was “the world is not the USA and vice versa”.

      • Kainsley@lemmy.world
        link
        fedilink
        arrow-up
        0
        arrow-down
        1
        ·
        1 year ago

        Yea for your average user I can get that, but this was an admin account. Sounds like 2FA was already compromised so will be interesting to understand how that happened in the first place.