Wednesday, October 9, 2024
Homecyber securityHugging Face Hack: Spaces Secrets Exposed

Hugging Face Hack: Spaces Secrets Exposed

Published on

Hugging Face, a leading AI and machine learning platform, has reported unauthorized access to its Spaces platform, explicitly targeting Spaces secrets.

This breach has raised concerns about the security of sensitive information and the potential impact on users.

Unauthorized Access Detected

Earlier this week, Hugging Face’s security team detected unauthorized access to their Spaces platform.

- Advertisement - EHA

The breach specifically targeted Space secrets, which are critical for the secure operation of various applications and services hosted on the platform.

The company suspects some of these secrets may have been accessed without proper authorization.

All-in-One Cybersecurity Platform for MSPs to provide full breach protection with a single tool, Watch a Full Demo

Hugging Face has taken swift action to mitigate the potential damage in response to the breach.

The company has revoked several Hugging Face (HF) tokens in the compromised secrets as a first step.

Affected users have already been notified via email and are advised to refresh any keys or tokens.

Additionally, Hugging Face recommends switching to fine-grained access tokens, now the default for enhanced security.

Enhanced Security Measures

Hugging Face collaborates with external cybersecurity forensic specialists to thoroughly investigate the incident and review its security policies and procedures.

Over the past few days, the company has implemented several significant improvements to the security of the Spaces infrastructure:

  • Removal of Org Tokens: Org tokens have been completely removed, increasing traceability and audit capabilities.
  • Key Management Service (KMS): A KMS has been implemented to manage Spaces secrets securely.
  • Token Leak Detection: The system’s ability to identify and proactively invalidate leaked tokens has been robustified and expanded.
  • General Security Enhancements: Overall security measures across the platform have been improved.

Hugging Face also plans to deprecate “classic” read-and-write tokens in favor of fine-grained access tokens once they reach feature parity.

The incident has been reported to law enforcement agencies and data protection authorities.

Hugging Face is committed to using this incident to strengthen the security of its entire infrastructure.

The company deeply regrets any disruption caused by the breach and understands the inconvenience it may have posed to users.

The recent breach at Hugging Face underscores the importance of robust cybersecurity measures in protecting sensitive information.

As the company works to enhance its security infrastructure, users are advised to stay vigilant and follow recommended practices to safeguard their data.

Get special offers from ANY.RUN Sandbox. Until May 31, get 6 months of free service or extra licenses. Sign up for free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Badge and CyberArk Announce Partnership to Redefine Privacy in PAM and Secrets Management

Partnership aims to help businesses eliminate vulnerable attack surfaces and provide a more streamlined...

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windwos Servers

The attackers exploited the EternalBlue vulnerability to gain initial access to the observatory farm,...

Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars

Recent discoveries in the automotive cybersecurity landscape have unveiled a series of critical zero-day...

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems

The Awaken Likho APT group launched a new campaign in June of 2024 with...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars

Recent discoveries in the automotive cybersecurity landscape have unveiled a series of critical zero-day...

Likho Hackers Using MeshCentral For Remotely Managing Victim Systems

The Awaken Likho APT group launched a new campaign in June of 2024 with...

Hackers Gained Unauthorized Network Access to Casio Networks

Casio Computer Co., Ltd. has confirmed that a third party illegally accessed its network...