TLDR
-
Canonical’s entire web infrastructure has been under a sustained cross-border DDoS attack since May 1, 2026 01:33 JST, exceeding 15 hours.
Key Takeaways
-
Affected services span 23+ components including archive.ubuntu.com, ppa.launchpad.net, security.ubuntu.com, launchpad.net, and login.ubuntu.com.
-
CVE and security notice APIs (Ubuntu Security API - CVEs, Ubuntu Security API - Notices) are confirmed down, affecting vulnerability tracking workflows.
-
Canonical describes it as a “sustained, cross-border attack” with no end time set; incident remains active and major severity.
-
Several services have cycled between Down and Operational repeatedly, indicating mitigation attempts are ongoing but unstable.
-
gopkg.in being affected is notable – it is a Go package redirect service used broadly beyond Ubuntu tooling.
Hacker News Comment Review
-
No substantive HN discussion yet.
Original | Discuss on HN