Zombie domains expose Snap Store to supply chain attacks

A critical vulnerability in Canonical's Snap Store allows attackers to hijack abandoned Linux applications by purchasing expired domains. This method enables malicious updates to be pushed automatically to users' systems. The issue was highlighted in an analysis by former Canonical engineer Alan Pope.

In the open-source world of Linux package management, a subtle yet dangerous flaw has emerged in the Snap Store, Canonical's platform for distributing Ubuntu applications. Attackers exploit expired domains linked to abandoned projects, using them to seize control of publisher accounts without breaching the store's servers directly. This 'zombie domain' threat turns the trust-based system into a vector for malware distribution, as detailed in a recent exposé by Alan Pope, a former engineering manager and developer advocate at Canonical. An earlier report had incorrectly credited the work to Daniele Procida, now a director of engineering at Canonical, but the analysis and original blog post belong to Pope. Published on January 27, 2026, the findings reveal how the Snap packaging format's metadata, specifically the public contact email in the snap.yaml file, becomes a weak point. When developers abandon projects, their domains lapse, creating opportunities for bad actors to register them cheaply—often for under $10—and set up email handlers to intercept password reset tokens from the Snap Store. With account access secured, attackers can upload malicious updates that install silently via the platform's automatic background updates, potentially granting root privileges or enabling activities like cryptomining and data theft. This approach hijacks authentic applications rather than mimicking them through typo-squatting, amplifying the risk in enterprise settings reliant on Snaps for servers and desktops. Pope's work underscores the low barrier to entry for such attacks, with simple tools available to scan the store for vulnerable domains. The vulnerability persists due to static verification processes, where 'verified publisher' badges remain even after domain ownership changes, eroding user trust. Similar issues plague repositories like NPM and PyPI, but Snap's direct tie between public emails and account recovery makes it especially susceptible. The snap info command further aids attackers by openly displaying contact details, prioritizing transparency over security. To counter this, experts advocate for ongoing publisher verification and masking of email addresses, though such reforms would demand major platform overhauls. Until addressed, users must manually verify software sources, undermining the convenience of automated updates. This case illustrates broader challenges in securing software supply chains, where digital identities hinge on mundane factors like domain renewals.

관련 기사

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
AI에 의해 생성된 이미지

Linux CopyFail exploit threatens root access amid Ubuntu outage

AI에 의해 보고됨 AI에 의해 생성된 이미지

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Scammers have exploited poor record-keeping at top universities to hijack hundreds of subdomains, serving explicit pornography and malicious scams. Researcher Alex Shakhov identified at least 34 affected institutions, including UC Berkeley, Columbia University, and Washington University in St. Louis. The vulnerabilities arise from unremoved DNS CNAME records for decommissioned subdomains.

AI에 의해 보고됨

Nineteen malicious packages on the npm registry are spreading a worm known as SANDWORM_MODE. These packages steal crypto keys, CI secrets, API tokens, and AI API keys. The theft occurs through MCP injection.

Ubuntu's official Twitter account posted a now-deleted tweet promoting a fake AI agent that directed users to a cryptocurrency scam. The incident follows a five-day DDoS attack on Canonical's web services that ended earlier this month.

AI에 의해 보고됨

Daemon Tools, a popular disk image mounting app, was compromised in a supply-chain attack starting April 8, delivering malware through official updates. Security firm Kaspersky reported infections on thousands of machines across over 100 countries. Users are urged to scan their systems immediately.

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부