Dendarii
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Nemeski@lemm.ee to Technology@lemmy.worldEnglish · 1 year ago

Over 5,300 GitLab servers exposed to zero-click account takeover attacks

www.bleepingcomputer.com

external-link
message-square
49
fedilink
353
external-link

Over 5,300 GitLab servers exposed to zero-click account takeover attacks

www.bleepingcomputer.com

Nemeski@lemm.ee to Technology@lemmy.worldEnglish · 1 year ago
message-square
49
fedilink
Over 5,300 internet-exposed GitLab instances are vulnerable to CVE-2023-7028, a zero-click account takeover flaw GitLab warned about earlier this month.
  • Lmaydev@programming.dev
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    1
    ·
    1 year ago

    Google is moving that way with passkeys. I think it’ll catch on with many people.

    Just cut the passwords out and go straight to unlocking with a device.

    That said not sure what happens if you lose your device.

    • Baines@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      edit-2
      1 year ago

      don’t even have to lose the device

      phone is the most common, plenty of ways in from mitm attacks (insecure wifi for example) to social eng the account phone provider

      guess you could go the dongle route but if it was super common thieves would just target them

      • asdfasdfasdf@lemmy.world
        link
        fedilink
        English
        arrow-up
        14
        ·
        1 year ago

        I think the question is less about getting hacked and more about getting permanently locked out of your account.

        • Baines@lemmy.world
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          1
          ·
          1 year ago

          sure but it shouldn’t be, any good process will have some recovery method

          course that can be a vulnerability as well

          thank god recovery questions are dead

      • kautau@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        1 year ago

        The idea with passkeys though is that it’s like a dongle, not just your phone number. It’s not an SMS code or link, it uses the cryptography hardware of your phone to authenticate. But the question of “what happens if I lose my phone” still persists.

        https://fidoalliance.org/passkeys/

        https://developer.apple.com/passkeys/

        https://blog.google/technology/safety-security/the-beginning-of-the-end-of-the-password/amp/

        • Baines@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 year ago

          I mean it’s just 2fa without the password so same issues with what I described

          https://www.csoonline.com/article/570795/how-to-hack-2fa.html

          just the first result on google

          • GigglyBobble@kbin.social
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            1 year ago

            “5 ways to hack 2FA” is pretty click-baity though. All of those attacks are either not exclusively related to 2FA or could target another component. If you can just bypass security altogether, instead of questioning 2FA, you should consider ditching that service/site.

            All except point 1, that is. But everyone should know by now that 2FA by SMS is insecure.

Technology@lemmy.world

technology@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


  • @[email protected]
  • @[email protected]
  • @[email protected]
  • @[email protected]
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 3.86K users / day
  • 9.72K users / week
  • 18.1K users / month
  • 37.7K users / 6 months
  • 1 local subscriber
  • 69.8K subscribers
  • 14.7K Posts
  • 615K Comments
  • Modlog
  • mods:
  • L3s@lemmy.world
  • enu@lemmy.world
  • Technopagan@lemmy.world
  • L4sBot@lemmy.world
  • L3s@hackingne.ws
  • L4s@hackingne.ws
  • BE: 0.19.9
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org