Obsidian plugin was abused to deploy a remote access trojan

(cyber.netsecops.io)

30 points | by cmbailey 1 hour ago

4 comments

  • kid64 9 minutes ago
    This is just the first detected and reported instance, in all likelyhood such attacks have been happening for some time. When will the fanatic userbsse finally admit that using Obsidian in any enterprise setting is just plain malpractice?

    It takes 5 minutes in their Discord channel to see the founders are D&D nerds, not competent engineers. It was never meant for serious work.

    • TacticalCoder 6 minutes ago
      > It takes 5 minutes in their Discord channel to see the founders are D&D nerds, not competent engineers.

      I know absolutely nothing about Obsidian but I'd expect quite a few competent engineers to also be D&D nerds no!?

      Are you saying the two are mutually exclusive?

  • slowmover 1 hour ago
    > The victim is prompted to enable the "Installed community plugins" synchronization feature.

    Obsidian has the proper protections in place to prevent this type of attack, and the victims are being convinced to ignore them. This is just a successful social engineering event. I hate to see Obsidian dragged down by this headline, since this attack is not exploiting a vulnerability in it or its plugin system.

    • Groxx 46 minutes ago
      Ehm. No? https://obsidian.md/help/plugin-security#Plugin+capabilities

      >Due to technical limitations, Obsidian cannot reliably restrict plugins to specific permissions or access levels. This means that plugins will inherit Obsidian's access levels. As a result, consider the following examples of what community plugins can do:

          Community plugins can access files on your computer.
          Community plugins can connect to internet.
          Community plugins can install additional programs.
      
      
      Obsidian has no protection at all. Installing a plugin gives it full access to your computer.

      This was only a matter of time, and honestly I think it's inexcusably negligent that they shipped a plugin system like this at all since about 2010 (or arguably much earlier).

      • pointlessone 34 minutes ago
        It does give full access but Obsidian does tell you that. Community plugins are not enabled by default, you have to enable them manually. Same happens with a shared vault: once you get it you still have to manually enable plugins. So far no one managed to sneak in a plugin completely unnoticed.
        • kid64 19 minutes ago
          That's horse hockey. Obsidian is not a usable system without community plugins.

          Folks will reply "but I use it every day without plugins".

          That position disregards software usability as a formal discipline, along with decades of UX research and standards.

          • Loocid 5 minutes ago
            As one of those people that uses Obsidian without plugins, what plugins do you consider essential?
          • kid64 7 minutes ago
            Yeah, but these attacks are possible without any of that complexity.
          • Barrin92 2 minutes ago
            I think that's especially important to point out because it reminded me of a blog post by Obsidian that also was discussed here[1], where they talked about reducing supply chain risk by not relying on dependencies, but people quickly pointed out that this is only possible because users depend so heavily on extensions.

            This combination of software relying on third parties without security seems to be untenable. Personally I've gotten rid of just about as many extensions as I can anywhere and switched to batteries included software.

            [1]https://news.ycombinator.com/item?id=45307242

          • ImPostingOnHN 16 minutes ago
            The attack here requires not just enabling community plugins, but also syncing the attacker's vault to your computer, and also separately enabling the synchronization of the attacker's plugins with yours.
        • Groxx 23 minutes ago
          "Hey users: don't do insecure things. Here's a button to do cool insecure things!" is not a plugin security model.
      • moron4hire 8 minutes ago
        A program one runs on one's computer can and should be able to do computer things. The alternative road you're advocating for ends in hardware attestation https://news.ycombinator.com/item?id=48086190
    • cmbailey 1 hour ago
      Right, I'm a heavy Obsidian user myself, and love it.

      I think the value of this disclosure is more in spreading awareness about plugins, and demonstrating the vector. Where less sophisticated users may think, "Oh, this is just a collection of markdown files. I don't need to be too worried about malicious code."

  • zhivota 41 minutes ago
    Even being social engineering, the design of the plugin system allowing this means the platform is completely unusable as a sharing tool. It's good to know but to me this is not "I need to remember to have these settings correct to use a shared Obsidian vault", this for is instead "never accept a shared Obsidian vault, demand a plaintext export".
  • ValveFan6666 40 minutes ago
    [dead]