So the take-away so far is that lemmy.world including admin accounts may be compromised. XSS attacks are being used, perhaps in a targeted, perhaps generalized fashion to steal session cookies which is pretty bad as it allows the attacker to gain the login session of any victims. In the case of an admin they could do anything an admin could which is pretty bad as far as being able to steal user information, plant further malware, escalate the attack, etc.
Do not visit lemmy.world, be wary of any and all links you click.
Saw a claim on hexbear that the instance doing the attacks is zelensky dot zip which is definitely something though what I don't know.
You should be able to invalidate any active login sessions by changing your password.
Wish I knew more about code, I don't really understand what this means. I did see that blahaj and potentially beehaw have been hacked too, little worried about us
Looks like it's time to install noscript (you can set global allowed mode and it still mostly kills most xss attacks). Meanwhile here I am sitting on top of default deny javascript for unknown non-whitelisted websites and laughing at pitiful attacks that don't even target browser zero-days.
Is this a default Lemmy thing? Cuz someone on that original thread said that an admin account was used to create this vulnerability. I really hope that's the case because protecting against XSS attacks is like, JavaScript 101.