Friday, January 24, 2025
Homecyber securityHugging Face Hack: Spaces Secrets Exposed

Hugging Face Hack: Spaces Secrets Exposed

Published on

SIEM as a Service

Follow Us on Google News

Hugging Face, a leading AI and machine learning platform, has reported unauthorized access to its Spaces platform, explicitly targeting Spaces secrets.

This breach has raised concerns about the security of sensitive information and the potential impact on users.

Unauthorized Access Detected

Earlier this week, Hugging Face’s security team detected unauthorized access to their Spaces platform.

The breach specifically targeted Space secrets, which are critical for the secure operation of various applications and services hosted on the platform.

The company suspects some of these secrets may have been accessed without proper authorization.

All-in-One Cybersecurity Platform for MSPs to provide full breach protection with a single tool, Watch a Full Demo

Hugging Face has taken swift action to mitigate the potential damage in response to the breach.

The company has revoked several Hugging Face (HF) tokens in the compromised secrets as a first step.

Affected users have already been notified via email and are advised to refresh any keys or tokens.

Additionally, Hugging Face recommends switching to fine-grained access tokens, now the default for enhanced security.

Enhanced Security Measures

Hugging Face collaborates with external cybersecurity forensic specialists to thoroughly investigate the incident and review its security policies and procedures.

Over the past few days, the company has implemented several significant improvements to the security of the Spaces infrastructure:

  • Removal of Org Tokens: Org tokens have been completely removed, increasing traceability and audit capabilities.
  • Key Management Service (KMS): A KMS has been implemented to manage Spaces secrets securely.
  • Token Leak Detection: The system’s ability to identify and proactively invalidate leaked tokens has been robustified and expanded.
  • General Security Enhancements: Overall security measures across the platform have been improved.

Hugging Face also plans to deprecate “classic” read-and-write tokens in favor of fine-grained access tokens once they reach feature parity.

The incident has been reported to law enforcement agencies and data protection authorities.

Hugging Face is committed to using this incident to strengthen the security of its entire infrastructure.

The company deeply regrets any disruption caused by the breach and understands the inconvenience it may have posed to users.

The recent breach at Hugging Face underscores the importance of robust cybersecurity measures in protecting sensitive information.

As the company works to enhance its security infrastructure, users are advised to stay vigilant and follow recommended practices to safeguard their data.

Get special offers from ANY.RUN Sandbox. Until May 31, get 6 months of free service or extra licenses. Sign up for free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular...

New Cookie Sandwich Technique Allows Stealing of HttpOnly Cookies

The "Cookie Sandwich Attack" showcases a sophisticated way of exploiting inconsistencies in cookie parsing...

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers...

Microsoft Unveils New Identity Secure Score Recommendations in General Availability

Microsoft has announced the general availability of 11 new Identity Secure Score recommendations in...