Zombie domains expose Snap Store to supply chain attacks

A critical vulnerability in Canonical's Snap Store allows attackers to hijack abandoned Linux applications by purchasing expired domains. This method enables malicious updates to be pushed automatically to users' systems. The issue was highlighted in an analysis by former Canonical engineer Alan Pope.

In the open-source world of Linux package management, a subtle yet dangerous flaw has emerged in the Snap Store, Canonical's platform for distributing Ubuntu applications. Attackers exploit expired domains linked to abandoned projects, using them to seize control of publisher accounts without breaching the store's servers directly. This 'zombie domain' threat turns the trust-based system into a vector for malware distribution, as detailed in a recent exposé by Alan Pope, a former engineering manager and developer advocate at Canonical. An earlier report had incorrectly credited the work to Daniele Procida, now a director of engineering at Canonical, but the analysis and original blog post belong to Pope. Published on January 27, 2026, the findings reveal how the Snap packaging format's metadata, specifically the public contact email in the snap.yaml file, becomes a weak point. When developers abandon projects, their domains lapse, creating opportunities for bad actors to register them cheaply—often for under $10—and set up email handlers to intercept password reset tokens from the Snap Store. With account access secured, attackers can upload malicious updates that install silently via the platform's automatic background updates, potentially granting root privileges or enabling activities like cryptomining and data theft. This approach hijacks authentic applications rather than mimicking them through typo-squatting, amplifying the risk in enterprise settings reliant on Snaps for servers and desktops. Pope's work underscores the low barrier to entry for such attacks, with simple tools available to scan the store for vulnerable domains. The vulnerability persists due to static verification processes, where 'verified publisher' badges remain even after domain ownership changes, eroding user trust. Similar issues plague repositories like NPM and PyPI, but Snap's direct tie between public emails and account recovery makes it especially susceptible. The snap info command further aids attackers by openly displaying contact details, prioritizing transparency over security. To counter this, experts advocate for ongoing publisher verification and masking of email addresses, though such reforms would demand major platform overhauls. Until addressed, users must manually verify software sources, undermining the convenience of automated updates. This case illustrates broader challenges in securing software supply chains, where digital identities hinge on mundane factors like domain renewals.

相关文章

Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
AI 生成的图像

Linux CopyFail exploit threatens root access amid Ubuntu outage

由 AI 报道 AI 生成的图像

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Scammers have exploited poor record-keeping at top universities to hijack hundreds of subdomains, serving explicit pornography and malicious scams. Researcher Alex Shakhov identified at least 34 affected institutions, including UC Berkeley, Columbia University, and Washington University in St. Louis. The vulnerabilities arise from unremoved DNS CNAME records for decommissioned subdomains.

由 AI 报道

Nineteen malicious packages on the npm registry are spreading a worm known as SANDWORM_MODE. These packages steal crypto keys, CI secrets, API tokens, and AI API keys. The theft occurs through MCP injection.

Criminals have distributed fake AI extensions in the Google Chrome Web Store to target more than 300,000 users. These tools aim to steal emails, personal data, and other information. The issue highlights ongoing efforts to push surveillance software through legitimate channels.

由 AI 报道

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

此网站使用 cookie

我们使用 cookie 进行分析以改进我们的网站。阅读我们的 隐私政策 以获取更多信息。
拒绝