Zombie domains expose Snap Store to supply chain attacks

A critical vulnerability in Canonical's Snap Store allows attackers to hijack abandoned Linux applications by purchasing expired domains. This method enables malicious updates to be pushed automatically to users' systems. The issue was highlighted in an analysis by former Canonical engineer Alan Pope.

In the open-source world of Linux package management, a subtle yet dangerous flaw has emerged in the Snap Store, Canonical's platform for distributing Ubuntu applications. Attackers exploit expired domains linked to abandoned projects, using them to seize control of publisher accounts without breaching the store's servers directly. This 'zombie domain' threat turns the trust-based system into a vector for malware distribution, as detailed in a recent exposé by Alan Pope, a former engineering manager and developer advocate at Canonical. An earlier report had incorrectly credited the work to Daniele Procida, now a director of engineering at Canonical, but the analysis and original blog post belong to Pope. Published on January 27, 2026, the findings reveal how the Snap packaging format's metadata, specifically the public contact email in the snap.yaml file, becomes a weak point. When developers abandon projects, their domains lapse, creating opportunities for bad actors to register them cheaply—often for under $10—and set up email handlers to intercept password reset tokens from the Snap Store. With account access secured, attackers can upload malicious updates that install silently via the platform's automatic background updates, potentially granting root privileges or enabling activities like cryptomining and data theft. This approach hijacks authentic applications rather than mimicking them through typo-squatting, amplifying the risk in enterprise settings reliant on Snaps for servers and desktops. Pope's work underscores the low barrier to entry for such attacks, with simple tools available to scan the store for vulnerable domains. The vulnerability persists due to static verification processes, where 'verified publisher' badges remain even after domain ownership changes, eroding user trust. Similar issues plague repositories like NPM and PyPI, but Snap's direct tie between public emails and account recovery makes it especially susceptible. The snap info command further aids attackers by openly displaying contact details, prioritizing transparency over security. To counter this, experts advocate for ongoing publisher verification and masking of email addresses, though such reforms would demand major platform overhauls. Until addressed, users must manually verify software sources, undermining the convenience of automated updates. This case illustrates broader challenges in securing software supply chains, where digital identities hinge on mundane factors like domain renewals.

Articoli correlati

Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Immagine generata dall'IA

Attackers hijack Linux Snap Store apps to steal crypto phrases

Riportato dall'IA Immagine generata dall'IA

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

Riportato dall'IA

Digital squatting has reached new heights as hackers increasingly impersonate brands through domain attacks. This form of cyber impersonation takes various shapes to deceive users and organizations. The trend highlights ongoing challenges in online security.

Researchers analyzing 10 million web pages have identified 1,748 active API credentials from 14 major providers exposed across nearly 10,000 websites, including those run by banks and healthcare providers. These leaks could enable attackers to access sensitive data or gain control over digital infrastructure. Nurullah Demir of Stanford University described the issue as very significant, affecting even major companies.

Riportato dall'IA

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

Cyber threat actors in Operation Zero Disco have exploited a vulnerability in Cisco's SNMP service to install persistent Linux rootkits on network devices. The campaign targets older Cisco switches and uses crafted packets to achieve remote code execution. Trend Micro researchers disclosed the attacks on October 16, 2025, highlighting risks to unpatched systems.

Riportato dall'IA

The cURL project, a key open-source networking tool, is ending its vulnerability reward program after a flood of low-quality, AI-generated reports overwhelmed its small team. Founder Daniel Stenberg cited the need to protect maintainers' mental health amid the onslaught. The decision takes effect at the end of January 2026.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta