frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Supabase MCP can leak your entire SQL database

https://www.generalanalysis.com/blog/supabase-mcp-blog
453•rexpository•6h ago•216 comments

Breaking Git with a carriage return and cloning RCE

https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
248•dgl•6h ago•86 comments

Bootstrapping a side project into a profitable seven-figure business

https://projectionlab.com/blog/we-reached-1m-arr-with-zero-funding
171•jonkuipers•1d ago•35 comments

Smollm3: Smol, multilingual, long-context reasoner LLM

https://huggingface.co/blog/smollm3
204•kashifr•7h ago•37 comments

Radium Music Editor

http://users.notam02.no/~kjetism/radium/
135•ofalkaed•6h ago•26 comments

Dynamical origin of Theia, the last giant impactor on Earth

https://arxiv.org/abs/2507.01826
60•bikenaga•5h ago•17 comments

CPU stuck at 0.80Ghz, Fixed by removing keyboard screw

https://www.dell.com/community/en/conversations/latitude/cpu-core-speed-stuck-at-080ghz-latitude-e7440/647f79dcf4ccf8a8de805bd2?page=2
9•ViscountPenguin•31m ago•2 comments

Brut: A New Web Framework for Ruby

https://naildrivin5.com/blog/2025/07/08/brut-a-new-web-framework-for-ruby.html
108•onnnon•5h ago•43 comments

Plants monitor the integrity of their barrier by sensing gas diffusion

https://www.nature.com/articles/s41586-025-09223-4
46•Bluestein•3d ago•9 comments

Taking over 60k spyware user accounts with SQL injection

https://ericdaigle.ca/posts/taking-over-60k-spyware-user-accounts/
143•mtlynch•5d ago•44 comments

Show HN: OffChess – Offline chess puzzles app

https://offchess.com
289•avadhesh18•14h ago•111 comments

Xenharmlib: A music theory library that supports non-western harmonic systems

https://xenharmlib.readthedocs.io/en/latest/
6•retooth•1h ago•0 comments

Can an email go 500 miles in 2025?

https://flak.tedunangst.com/post/can-an-email-go-500-miles-in-2025
253•zdw•4d ago•98 comments

GlobalFoundries to Acquire MIPS

https://mips.com/press-releases/gf-mips/
146•mshockwave•6h ago•96 comments

Ask HN: What are some cool or underrated tech companies based in Canada?

64•pedrodelfino•3h ago•33 comments

The Tradeoffs of SSMs and Transformers

https://goombalab.github.io/blog/2025/tradeoffs/
35•jxmorris12•4h ago•5 comments

Show HN: A rain Pomodoro with brown noise, ASMR, and Middle Eastern music

https://forgetoolz.com/rain-pomodoro
39•ShadowUnknown•6h ago•25 comments

Ceramic: A cross-platform and open-source 2D framework in Haxe

https://ceramic-engine.com/
43•-yukari•3d ago•3 comments

Show HN: Jukebox – Free, Open Source Group Playlist with Fair Queueing

https://www.jukeboxhq.com/
88•skeptrune•8h ago•33 comments

Inertial forces (indirect terms) in problems with a central body

https://astro.theoj.org/article/141682-on-inertial-forces-indirect-terms-in-problems-with-a-central-body
9•raattgift•3d ago•0 comments

On The Meaning of Ritual

https://alicemaz.substack.com/p/on-the-meaning-of-ritual
56•jger15•3d ago•50 comments

Particle Lenia Deluxe Edition

https://www.craftlinks.art/Notebook/particle-lenia/
25•CraftingLinks•3d ago•4 comments

Blind to Disruption – The CEOs Who Missed the Future

https://steveblank.com/2025/07/08/blind-to-disruption-the-ceos-who-missed-the-future/
62•ArmageddonIt•10h ago•71 comments

SVGs that feel like GIFs

https://koaning.io/posts/svg-gifs/
366•cantdutchthis•15h ago•97 comments

New sphere-packing record stems from an unexpected source

https://www.quantamagazine.org/new-sphere-packing-record-stems-from-an-unexpected-source-20250707/
405•pseudolus•1d ago•204 comments

Mercury: Ultra-fast language models based on diffusion

https://arxiv.org/abs/2506.17298
553•PaulHoule•1d ago•229 comments

I used o3 to profile myself from my saved Pocket links

https://noperator.dev/posts/o3-pocket-profile/
497•noperator•1d ago•190 comments

Attimet (YC F24) – Quant Trading Research Lab – Is Hiring Founding Researcher

https://www.ycombinator.com/companies/attimet/jobs/6LaQIc5-founding-researcher-quant
1•kbanothu•11h ago

The Day You Became a Better Writer (2007)

https://dilbertblog.typepad.com/the_dilbert_blog/2007/06/the_day_you_bec.html
12•santiviquez•1d ago•1 comments

Epanet-JS

https://macwright.com/2025/07/03/epanet-placemark
201•surprisetalk•4d ago•22 comments
Open in hackernews

Taking over 60k spyware user accounts with SQL injection

https://ericdaigle.ca/posts/taking-over-60k-spyware-user-accounts/
143•mtlynch•5d ago

Comments

mtlynch•7h ago

  sqlmap https://catwatchful.pink/webservice/servicios.php?operation=getDevice&imei=M6GPYXHZ95ULUFD0
  ...
  sqlmap identified the following injection points
This was the wildest part to me. I'd heard of sqlmap but I didn't realize it was so good that you can just hand it a URL that hits the database and the tool basically figures out from there how to dump the database contents if there's any SQL injection vulnerability.

>Intercepting my test phone’s traffic confirms that the files are directly uploaded to Firebase, and reveals that the commands for features like live photos are also handled through FCM. This is going to reduce our attack surface by a lot - nothing in Firebase is going to be IDORable or vulnerable to SQLI, and some quick testing eliminates any of the usual traps like open storage buckets or client-side service account credentials.

I was surprised at how the malware devs made such sloppy mistakes but being on Firebase protected them from more severe vulnerablities. I've seen other vendors get popped by configuring Firebase incorrectly, but it seems like if you configure the basics right, it cuts down the attack surface a lot.

supriyo-biswas•6h ago
The incorrect Firebase configuration usually stems from people trying to have the frontend write database entries directly, however these developers usually had an old-school backend sending structured objects to Firebase, so that issue was kinda mitigated.
sigmoid10•5h ago
>I'd heard of sqlmap but I didn't realize it was so good

The blog correctly explains how it has become pretty useless in our age where noone writes their own database integration anymore and everyone uses off-the-shelf components, but man... I remember a time when it felt like literally every sufficiently complex web service was vulnerable to sql injection. You could write a small wrapper for sqlmap, hook it up to the results of a scraper, let it run over night on every single piece of data sent to the server and the next day you'd have a bunch of entry points to choose from. It even handled WAFs to some degree. I'm out of it-sec for several years now, but I still remember every single command line argument for sqlmap like it was yesterday.

technion•1h ago
Ive always admired hn for bringing me people in very different spaces. Of the development teams I've worked with in the last year pretty much all of them were writing injectable code by default. Ive got an email from an executive in a saas telling me they aren't worried because they geofilter china.
fancyswimtime•1h ago
what?
Lucasoato•43m ago
Implying Chinese hackers can't use a VPN to bypass that geofilter lol
RankingMember•4h ago
I agree, I'm blown away at the level to which this kind of probing and exfiltration has been abstracted. Not quite surprised that years of iteration have led to this, but still, I didn't realize it'd become this easy.
jerf•3h ago
"I'd heard of sqlmap but I didn't realize it was so good that you can just hand it a URL that hits the database and the tool basically figures out from there how to dump the database contents if there's any SQL injection vulnerability."

If there's one lesson I'd convey to people about security it is do not underestimate your foes. They've been building tools for decades just like any other discipline.

Tech to find a hole in your system that lets you run an arbitrary-but-constrained fragment of shell code that can put a small executable on to the system that puts a larger executable on that lifts itself up to root and also joins a centralized command-and-control server with the ability to push arbitrary code across entire clusters of owned systems is not some sort of bizarre, exotic technology that people only dream of... it's off-the-shelf tech. It's a basic building block. Actually sophisticated attackers build up from there.

If $YOU're operating on the presumption I see so often that the script kiddies blind-firing Wordpress vulnerabilities at servers is the height of attacker's sophistication $YOU are operating at an unrecoverable disadvantage against these people.

ryanrasti•7h ago
> Q: Can I monitor a phone without them knowing?

> A: Yes, you can monitor a phone without them knowing with mobile phone monitoring software. The app is invisible and undetectable on the phone. It works in a hidden and stealth mode.

How is that even possible on a modern Android? I'd think one of the explicit goals of the security model would be to prevent this.

ridgewell•7h ago
I'm not familiar with this app but based on the read, it sounds like they're essentially relying on someone to sneak into the target's phone, install an apk with a 'Settings' logo, where you grant it all permissions (I assume the installer facilitates the process of manually granting full permissions for each permissions type and disabling battery optimization). Android does allow you to effectively delegate full permissions to an app like that, albeit in a manual way.
afarah1•7h ago
Camera and microphone usage should be hard-wired to an LED
Polizeiposaune•7h ago
and a switch which has a physical air gap when off.
itslennysfault•5h ago
Thanks for your suggestion, but at this time the NSA cannot allow this change.
ryanrasti•5h ago
Haha! That gave me a good laugh.
MisterTea•3h ago
"But the switch will compromise its water tightness like the headphone jack does!" - every mobile sycophant.
roland35•5h ago
I wonder if it would show up in periodic permissions scans done by android. Hopefully!

But as the TechCrunch author stated, oftentimes alerting the stalker can be dangerous for the victim.

boznz•2h ago
I think setting up your own evil-proxy or evil-wifi-hotspot and periodically connecting your phone to them may help in the detection of these and many other phone home malware. I am getting closer to the paranoia threshold to almost give it a try.
esaym•7h ago
> The live photo and microphone options are particularly creepy, successfully taking a photo or recording and uploading it for me to view near-instantly on the control panel without giving the phone user the slightest sign that anything is amiss

Oh dear.

blueplanet200•7h ago
From sqlmap

> Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program"

I don't know the legal footing these spyware apps stand on, but this blog post seems like exhibit A if Catwatchful ever decided to sue the author, or press criminal charges. Hacking, even for reasons that seem morally justified, is still illegal.

VWWHFSfQ•7h ago
Yeah this whole exercise was completely illegal and I'm surprised this person publicly (and proudly) blogged about it like this.

They probably need to engage an attorney now.

SoftTalker•6h ago
Author is in Canada, not sure if/how that changes things.
mtlynch•6h ago
The server they compromised is essentially a command and control server for an illegal botnet.

Are there documented cases of botnet owners trying to sue or get law enforcement to prosecute someone for infiltrating their botnet?

I'd be more concerned about extralegal retaliation from people in the malware ecosystem.

dylan604•6h ago
Hey, that's my server, and is totally 100% legit. I was unaware that I was pwnd and someone was using it as a C&C server. I'm now suing you for hacking my server, as you could be the person that installed the C&C server. After all, you are an admitted hacker.

Stranger things have won in court

rendall•6h ago
Your theory is that Daigle is at risk of a Canadian prosecutor hauling him into court based on the criminal complaint of a Uruguayan purveyor of stalkerware? That's novel.
eddythompson80•6h ago
I think the theory is that Daigle has publicly professed to committing a crime sharing all their steps and receipts. It'll be unheard of of course if a Uruguayan purveyor of stalkerware take him to court.

However, next time he talks about emulating Nintendo games or whatever, I'm sure Nintendo lawyers would love to bring it up and point "how the defendant brazenly defies law and order with predetermination malice".

Not to begin to even mention now some shady criminal might hold a grudge against Daigle. I hope his security is air tight.

There is a reason these reports are usually anonymous or follow responsible disclosure.

dylan604•6h ago
Just preface the story with "last night I had a dream that I..." Now, it is a work of fiction.
eddythompson80•6h ago
Pretty sure that has never stood in court and it can only hurt you. It shows to the jury that you're trying to be dishonest.
rendall•5h ago
Rest easy, Daigle is legally immune from concern trolling.
eddythompson80•5h ago
good for him
lcnPylGDnU4H9OF•4h ago
> next time he talks about emulating Nintendo games or whatever

This seems like a straw man, though? What if they just... continue to not do that? (I think this is what the other commenter meant with "concern trolling".)

> Not to begin to even mention now some shady criminal might hold a grudge against Daigle.

This is 1) not a problem a lawyer will help you with and 2) not a practical concern for most people in the US and Canada. For example, Brian Krebs continues to (read: he's not dead or otherwise intimidated into silence) put his name behind many similar reports of illegal activity. There is a reason law enforcement investigates and prosecutes violent crime.

I don't really see a practical reason for this person to avoid putting their name behind this report. The only reason that seems to make sense is if this group is not a criminal enterprise. Then they might be at all inclined to file a lawsuit.

mtlynch•1h ago
>For example, Brian Krebs continues to (read: he's not dead or otherwise intimidated into silence) put his name behind many similar reports of illegal activity. There is a reason law enforcement investigates and prosecutes violent crime.

Brian Krebs invests a huge amount into keeping his home address a secret and has extensive surveillance at his home to keep intruders out. He was once SWATed and another time someone ordered heroin to his home and called the police to frame him for drug trafficking.[0]

It's a bit of a miracle that Krebs continues his reporting. Krebs' courage and opsec is not very easy to achieve, especially for a 23 year old blogger like OP.

[0] https://news.ycombinator.com/item?id=42354602

lcnPylGDnU4H9OF•1m ago
These points are not isn’t convincing. That paragraph says that he expends effort to keep his home address secret but then admits that those efforts are in vain because he’s been mailed things maliciously (to his home address) and SWATed (at his home address). It’s also not likely that surveillance will keep intruders out; it would help the criminal investigation after his house is burned down, except that hasn’t happened.

I agree that he’s courageous but only because he receives many threats not because there are imminent dangers. His protection comes from the fact that a criminal enterprise will only bring attention to themselves by purchasing his murder, which is true because law enforcement investigates and prosecutes violent crime.

lawlessone•4h ago
Class action lawsuit from a group of stalkers?
rendall•6h ago
That would be an amusing exercise in self-incrimination & discovery pain for Catwatchful. They would also have to quantify business losses, which requires admitting the value of an illicit enterprise. But YOLO am I right? LFG!
deadbabe•6h ago
About half of hacking articles are just fake things people claim to have done but didn’t actually happen and no one checks on it, and conveniently by the time they publish the exploit was “fixed”. So you can’t verify for yourself anyway.

Without hard proof that the author did what they said they did, you have no real case. This particular story already sounds far fetched but makes good fantasy.

munchler•6h ago
FWIW, this story has been verified by a reporter at TechCrunch, who says he used the dumped database to identify the spyware admin in Uruguay.

https://techcrunch.com/2025/07/02/data-breach-reveals-catwat...

deadbabe•2h ago
Doesn’t change what I said
SLWW•4m ago
Considering that it was simply just a PoC and the disclosures are listed at the bottom, before the publication, this would usually be considered "white hat" which... throughout history has always been a bit of a grey area. Although more and more businesses are accepting the help when they are given it. I do agree you shouldn't use your Christian name in these sorts of situations since priors have not been established with the targetted company; however Catwatchful has no impetuous to pursue meaningless charges for a stalker app as there are no damages.

Do you really think that the users of a stalker app care if the app got "hacked" once or twice? Do you also think that the app makers themselves really want to remind the legal world that this stuff is legal when i bet you >50% of their users probably installed it on devices that aren't theirs? IDK, personally I would avoid the law at all costs if I released something this shady.

bspammer•7h ago
It's unexpected to me that someone with the technical knowhow to build spyware like this and a nice web interface for it, made basic mistakes like storing passwords in plaintext and piping unescaped user input into database queries.
imzadi•5h ago
I'd be willing to bet that getting their user's passwords is part of their goal. So they would need to be stored somewhere.
andoando•1h ago
They probably just didn't care to
JohnMakin•5h ago
some time ago I was having super weird phone issues (iphone) and narrowed it down to one of these services. I clearly had been 0 click vuln’d because I couldnt fathom how else it could have been infected, but had no idea who or why, still dont know. felt extremely gross and I have absolutely zero sympathy for any users or operators of these services and think this researcher was far too polite about it.
ceva•2h ago
Someone who is in malware business will 100% not sue you for what you did, i wouldn't worry about that at all. You did a good job!
gpm•1h ago
The TechCrunch article says

> Google said it added new protections for Google Play Protect

But the screenshot of the device settings in the article shows that the app has you turn off Google Play Protect. So does this even do anything?

Meanwhile Google (via its firebase brand) is apparently continuing to act as a host for this app...