Ubuntu Hit with 4 Day DDoS by Pro-Iran Hacktivists

From our friends at It’s FOSS

Ubuntu’s websites went down for about 4 days last week but it should all be back now.

Starting April 30, Canonical’s web services faced what the company described as a “sustained, cross-border” attack. The ubuntu.com website, Snap store, Launchpad, and several other Canonical-owned services went offline or became unreliable.

The attack lasted until around May 4, when services were gradually restored. As of today, Canonical’s official status page shows everything fully operational. Let’s hope it stays that way.

What was actually affected: The ubuntu.com website, Snap store (snapcraft.io), Launchpad (including PPAs), login.ubuntu.com, keyserver.ubuntu.com, and Canonical’s own website.

What was NOT affected: Your Ubuntu installation, package updates (APT repositories are mirrored across the world and kept working), ISO downloads, and the Ubuntu operating system itself. Your system was never at risk.

Canonical has not released a detailed post-incident report yet. A hacktivist group called 313 reportedly claimed responsibility, but this has not been confirmed by Canonical.

If you had trouble running snap install commands or pulling from a PPA last week — that’s why. Everything should be working normally now.

No data was compromised. No user systems were affected. The attack targeted web availability, not security.

⎯⎯⎯

Keep following It’s FOSS for more Linux News

This Article Mentions a DDoS Attack

A Distributed Denial of Service attack can happen to anyone. The goal is not to be a target, but when it does happen to your business, do you have a backup plan for providing services to your customers? Is your private or public cloud properly configured with the resiliency to withstand the storm? If you would like to know, book a consultation with our experts and get peace of mind today.

No responses yet

Leave a Reply

Your email address will not be published. Required fields are marked *

Latest Comments

No comments to show.