Malware found again in the Snap Store

  • The Snap Store is once again embroiled in bad news.
  • Malicious software has been detected again in the snap package store.
  • This is not the first time it has happened.

Malware in the Snap Store

In recent days, a worrying case has come to light related to the Snap StoreThe official repository for Snap applications used in many GNU/Linux distributions. The problem isn't related to technical flaws in the packaging system itself, but rather to an abuse of the trust model on which the store is based.

What happened is that Malicious third parties have managed to publish versions containing malicious code They targeted previously legitimate applications. To do this, they didn't create new accounts or suspicious packages from scratch, but rather took control of legitimate developer accounts that had been inactive for some time. This made the affected applications appear trustworthy, as they had a history, previous downloads, and didn't trigger immediate alerts.

This is not the first time the Snap Store has been compromised

The key to the attack lies in the domains associated with those developer accounts. In many cases, the original projects were no longer being maintained, and the web domains linked to them had expired. The attackers re-registered these domains and, by controlling the associated email addresses, were able to regain access to the publishing accounts on the Snap Store. Once inside, all they had to do was upload a modified software update.

The detected malicious code focused primarily on cryptocurrency-related applications.These altered versions mimicked the behavior of legitimate wallets and prompted the user for sensitive data such as the recovery phrase. This information was sent to servers controlled by the attackers, allowing them to steal funds without exploiting operating system vulnerabilities.

This type of attack is especially dangerous because it does not depend on deceiving the user with fake names or clearly suspicious applications. It relies on the accumulated confidence from past projects and in the lack of strict mechanisms to verify that the owner of a developer account remains who they claim to be over time.

The affected applications have already been removed

After the problem was detected, The affected applications were removedEven so, the incident has reignited the debate about the security of centralized software stores and the extent to which automated review systems are sufficient. It also highlights the importance of protecting developer accounts, especially those associated with abandoned or no longer actively maintained projects.

For users, the main lesson is that no app store is infallible. Even in environments like Linux, traditionally perceived as more secure, abuses can occur when the distribution model relies on trust and automation. Exercising extreme caution with sensitive applications, especially those related to cryptocurrencies or credentials, remains a crucial measure.