The issue does say changing the password should kick the user out, but yeah, still not good.
CMahaff
Oh man, that would be brutal if they are resetting the password and it isn't kicking the attacker out...
Yeah, I've been scared to turn on 2FA with all the reports of people being locked out:
I actually consider it good news that the redirection is happening this way (something that can be done just by having the lemmy credentials of an admin) vs something indicating they have access to the server itself.
My concern is that configuring the site to automatically redirect users sounds like they have pretty large control over the site - the kind of control that I would assume is usually limited to users with root access on the server.
Obviously hope nothing of value is lost and that there is a proper off-site backup of the content.
Edit: See Max-P's comment, it looks like the site redirection was accomplished in a way that IMO suggests they do NOT have full control over the site. We'll obviously have to wait for the full debrief from the admins.
4AM in the Netherlands where the instance owner Ruud lives... hopefully his assistant admins can clean it up, but it might be a bit before he even knows anything is wrong.
Well I guess I'll have to respond with my .ml account instead of my .world account.
Tried to delete this post and post it again, which is what I see from .world, but on .ml both new posts came across, but no deletes did.
So now I can't access this specific post from .world.
Federation bugs are a trip!
Oh man this one is SO much worse. If this is what is going on the only way to kick out the hacker will probably be to manually alter the DB. Yikes.
I hope the admin team is aware of this - not sure how one would even contact them.