Update on the @Alby attack: ⚠️ IT’S WORSE THAN I THOUGHT! ⚠️ What I believe is happening is someone is using the public Lightning addresses from Nostr profiles to doxx everyone’s registered email address on Alby. By simply entering a valid Alby address, the login page LEAKS the corresponding email address. This means that the purpose of the attack is not so much to breach your Alby account, it’s to collect emails of Alby users for future phishing attacks. image

Replies (78)

And it would be one thing if this were a novel attack, but it isn't. This has been an item to consider for years. We probably covered it in my web Dev security courses in 2014. It was probably a thing even before that. It's malpractice.
Responsible disclosure matters and this is not the way to do it… I have already PMed @bumi. While there is urgency for people to change their emails to a throwaway, you should not be disclosing how/why it works. We don’t need 1000 people with access to the e-mails instead of 1. Attackers are usually faster than users/devs too.
Even if this is the case, it doesn't excuse the way their password reset system exposes the users email. This is security basics, and it's an absolute failure.
I understand why you feel that way, but after seeing every one of my multiple Lightning address emails receive a reset message, I believe the damage has already been done.
this is why i never used my actual email address and use aliases for everything. email gets put on some list? cool, delete the alias and move on.
------------------------------------------------- Privacy and Other Related Stuff ------------------------------------------------- Keep private. 1️⃣Use email alias forever on each service 2️⃣Use 2FA - not sms - whenever possible 3️⃣Delete all services that you dont use 4️⃣Encrypt everything. No busques la perfección. Una acción cada vez y mejorar cada día. ------------------------------- End of transmission -------------------------------
The Daniel ⚡️'s avatar The Daniel ⚡️
Update on the @Alby attack: ⚠️ IT’S WORSE THAN I THOUGHT! ⚠️ What I believe is happening is someone is using the public Lightning addresses from Nostr profiles to doxx everyone’s registered email address on Alby. By simply entering a valid Alby address, the login page LEAKS the corresponding email address. This means that the purpose of the attack is not so much to breach your Alby account, it’s to collect emails of Alby users for future phishing attacks. image
View quoted note →
Susana Chicoria 's avatar
Susana Chicoria 2 months ago
Yup. That happened to me, I lost access to one of my accounts. I unsubscribed Alby and I just had this email from Alby today….. image
I'll add - always double check If the email you received is from Alby. The only way to reliable do this is to check the address it was sent from, as the email design can look identical. Be especially weary if the email prompts you to click some link or login somewhere
Received a bunch of these emails to reset alby recently, including for old abandoned/test accounts. I was getting suspicious.
Hey Susana, If you want to get access to your old account you can DM us at support@getalby.com and we should be able to help!
FWIW - email from Alby Support: Overnight we have received notices of some unusual requests to our infrastructure. Over a short period of time many password reset emails had been requested from various residential proxies around the world. Our rate limiting protects against spamming attacks but requests got through to request password reset emails. Many of the requests are likely for emails that had been included in some data breach or have been publicly exposed by their owner. Password request emails also have been requested for lightning addresses which falsely exposed the user's email address. This had been a feature deployed to help users keep easy access to their accounts. But as many users post their lightning address on profiles like nostr this should not be exposed and a fix has been deployed immediately. Generally there should be no way to display a user's email address. We have failed here. About 5500 password reset emails had been requested by the attacker. We have not seen any abnormal related login activity and accounts are safe. People who got a password reset email can ignore the email. As we have seen a general increase in attacks on user accounts trying to brute force logins with some emails from some data leaks we have fully disabled password logins and require all users to login with the one time token. This adds an another layer of security. Additionally we also offer the option to login with Google. Please note: only Alby Accounts use email-based login. Alby Hub, the Alby Browser Extension, and Alby Go are not affected.
my email has been leaked many times. You can search your email in have I been pawned website and it shows you all the leaks. I'm not worried, I get phishing emails all the time. They go straight to my spam folder
HOLY SHIT, WHAT A MESS 🤑 👇
The Daniel ⚡️'s avatar The Daniel ⚡️
Update on the @Alby attack: ⚠️ IT’S WORSE THAN I THOUGHT! ⚠️ What I believe is happening is someone is using the public Lightning addresses from Nostr profiles to doxx everyone’s registered email address on Alby. By simply entering a valid Alby address, the login page LEAKS the corresponding email address. This means that the purpose of the attack is not so much to breach your Alby account, it’s to collect emails of Alby users for future phishing attacks. image
View quoted note →
Why? I don't care if my email is leaked. I put it on my website. I've been on the internet long enough to not click links inside emails.
Requiring an email address is what has always kept me away. And no, not going to just spin up a burner email, just not gonna do it. Stop asking for emails and stop providing them.
today (29.12.25) i received an email from crypto.com – a service i never registered for. i‘m an alby user. i suspect this leak to be the culprit.
I got one too, but sent to an email address I didn’t use with Alby. Scammers just use lists of anyone connected with crypto services to victimize and hope a handful of them respond. Sadly, enough do to make it profitable.