Zombie domains expose Snap Store to supply chain attacks

A critical vulnerability in Canonical's Snap Store allows attackers to hijack abandoned Linux applications by purchasing expired domains. This method enables malicious updates to be pushed automatically to users' systems. The issue was highlighted in an analysis by former Canonical engineer Alan Pope.

In the open-source world of Linux package management, a subtle yet dangerous flaw has emerged in the Snap Store, Canonical's platform for distributing Ubuntu applications. Attackers exploit expired domains linked to abandoned projects, using them to seize control of publisher accounts without breaching the store's servers directly. This 'zombie domain' threat turns the trust-based system into a vector for malware distribution, as detailed in a recent exposé by Alan Pope, a former engineering manager and developer advocate at Canonical. An earlier report had incorrectly credited the work to Daniele Procida, now a director of engineering at Canonical, but the analysis and original blog post belong to Pope. Published on January 27, 2026, the findings reveal how the Snap packaging format's metadata, specifically the public contact email in the snap.yaml file, becomes a weak point. When developers abandon projects, their domains lapse, creating opportunities for bad actors to register them cheaply—often for under $10—and set up email handlers to intercept password reset tokens from the Snap Store. With account access secured, attackers can upload malicious updates that install silently via the platform's automatic background updates, potentially granting root privileges or enabling activities like cryptomining and data theft. This approach hijacks authentic applications rather than mimicking them through typo-squatting, amplifying the risk in enterprise settings reliant on Snaps for servers and desktops. Pope's work underscores the low barrier to entry for such attacks, with simple tools available to scan the store for vulnerable domains. The vulnerability persists due to static verification processes, where 'verified publisher' badges remain even after domain ownership changes, eroding user trust. Similar issues plague repositories like NPM and PyPI, but Snap's direct tie between public emails and account recovery makes it especially susceptible. The snap info command further aids attackers by openly displaying contact details, prioritizing transparency over security. To counter this, experts advocate for ongoing publisher verification and masking of email addresses, though such reforms would demand major platform overhauls. Until addressed, users must manually verify software sources, undermining the convenience of automated updates. This case illustrates broader challenges in securing software supply chains, where digital identities hinge on mundane factors like domain renewals.

Related Articles

Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Image generated by AI

Attackers hijack Linux Snap Store apps to steal crypto phrases

Reported by AI Image generated by AI

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Reported by AI

Linux systems face significant risks from unpatched vulnerabilities, challenging the notion of their inherent security. Experts emphasize the need for automated patch management to protect open-source enterprises effectively.

Cisco Talos has detailed how a Chinese-linked group is exploiting an unpatched zero-day in email security appliances since late November 2025, deploying backdoors and log-wiping tools for persistent access.

Reported by AI

At the NDSS 2025 conference, Hengkai Ye and Hong Hu from The Pennsylvania State University presented a paper on subtle vulnerabilities in Linux systems that reintroduce executable stacks. Their work highlights how developers, including security experts, accidentally disable protections against code injection attacks. The study examines tools and system components to reveal gaps in enforcing write-xor-execute policies.

Anthropic's official Git MCP server contained worrying security vulnerabilities that could be chained together for severe impacts. The issues were highlighted in a recent TechRadar report. Details emerged on potential risks to the AI company's infrastructure.

Reported by AI

Security experts are cautioning PayPal users about a scam where the platform's subscription feature is being exploited to deliver fraudulent purchase confirmation emails. This abuse leverages the legitimate PayPal system to deceive recipients into believing they have made unauthorized transactions. The warning highlights the need for vigilance in verifying email authenticity.

 

 

 

This website uses cookies

We use cookies for analytics to improve our site. Read our privacy policy for more information.
Decline