Categories: Cyber Security News

Hackers Abuse Integrity Flaw to Compromise Signal, Slack, 1Password

In a striking demonstration of software supply chain risk, researchers at Trail of Bits uncovered a novel vulnerability—CVE-2025-55305—that enables attackers to locally backdoor Electron-based applications by tampering with V8 heap snapshot files.

This framework-level bypass impacts high-profile targets, including Signal, 1Password, Slack, and even Chrome derivatives.

By exploiting overlooked “frozen pizza” shortcuts in the V8 engine, adversaries can inject persistent, stealthy malware into signed applications without triggering integrity checks or code-signing failures.

Heap Snapshot Tampering:

Electron applications leverage V8 heap snapshots to accelerate startup by deserializing a pre-initialized JavaScript context.

These binary snapshot files, however, are not classified as “executable” by Electron’s integrity fuses—EnableEmbeddedAsarIntegrityValidation and OnlyLoadAppFromAsar—nor by Chromium’s code-signing enforcement.

Consequently, an attacker with filesystem write access can overwrite a trusted application’s v8_context_snapshot.bin with a malicious version, bypassing both OS-level signature checks and Electron’s ASAR integrity validation.

By using Electron’s prebuilt mksnapshot tool, threat actors can embed JavaScript gadgets into heap snapshots that clobber V8 built-in functions—such as Array.isArray—to achieve arbitrary code execution in any V8 isolate.

For instance, overwriting Array.isArray A payload that logs keystrokes or spawns unauthorized processes demonstrates how unsigned code can execute undetected.

The simplicity of this technique allows attackers to establish stealthy persistence, evade endpoint detection (including CrowdStrike Falcon), and bypass application control policies like AppLocker.

Electron applications often install into user-writable directories (e.g., %AppData%Local on Windows or /Applications on macOS), making them ideal vectors for backdoor insertion without requiring privilege escalation.

Once loaded, the malicious snapshot executes on every subsequent launch, providing attackers with full access to both the renderer and main processes.

In the main process, Node.js APIs enable unconstrained file system access, network communication, and dynamic library loading.

Despite integrity-checking fuses being available, they are disabled by default and do not cover heap snapshots.

As a result, even security-conscious organizations like Slack, 1Password (patched in v8.11.8-40), and Signal were vulnerable until this flaw was responsibly disclosed and patched.

Electron maintainers worked swiftly to address the issue, underscoring the importance of comprehensive integrity mechanisms that include all forms of executable content.

Looking ahead, this vulnerability highlights a broader risk across Chromium-based applications.

Local attackers can exploit snapshot tampering to compromise browsers and derivative clients, bypassing the Chrome threat model that excludes physically local attacks.

To mitigate these risks, developers should enable and extend integrity checks to include heap snapshots and unsigned code loading—ensuring that any code deserialized into V8 isolates is cryptographically verified.

Organizations relying on Electron or Chromium-based software must audit their deployment configurations, apply patches promptly, and implement continuous integrity monitoring.

With snapshot-based backdoors now proven feasible, proactive defenses and a robust threat model are critical to safeguarding user data and maintaining trust in signed applications.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

The post Hackers Abuse Integrity Flaw to Compromise Signal, Slack, 1Password appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Vanilla Scroll Sky: Pure CSS Scrollytelling Library

Vanilla Scroll Sky is a pure CSS scrollytelling library that creates sticky image reveals and…

1 hour ago

CSS Framework With Almost No Classes – no.css

no.css is a pure CSS front-end framework that helps developers quickly create modern web pages…

1 hour ago

Michigan Medicine and Blue Cross negotiations cause stress for thousands of patients

DETROIT, MICH. (WOWO) Patients who rely on both Blue Cross Blue Shield and Michigan Medicine…

2 hours ago

New BitUnlocker Downgrade Attack on Windows 11 Allows Access to Encrypted Disks Within 5 Minutes

A new tool, BitUnlocker, reveals a practical downgrade attack against Microsoft’s BitLocker encryption, allowing attackers…

2 hours ago

Hackers Abuse CVE-2026-41940 to Take Over cPanel and WHM Servers

A fatal authentication bypass vulnerability is actively affecting cPanel and WebHost Manager (WHM) servers worldwide.…

2 hours ago

84 TanStack npm Packages Hacked in Ongoing Supply-Chain Attack Targeting CI Credentials

A significant supply-chain compromise affecting 84 npm package artifacts across the TanStack namespace. The malicious…

2 hours ago

This website uses cookies.