Ubuntu servers taken offline by "sustained, cross-border attack"

· security · Source ↗

TLDR

  • Ubuntu and Canonical infrastructure went down after exploit code enabling root access on most Linux distros was released, blocking security guidance delivery.

Key Takeaways

  • Affected URLs include archive.ubuntu.com, security.ubuntu.com, canonical.com, ubuntu.com, and related APIs – covering package delivery and CVE notices.
  • The outage followed public release of exploit code granting root to unprivileged users across virtually all Linux distributions.
  • Ubuntu’s ability to publish security advisories and guidance is blocked; mirror sites still serve package updates.
  • The attack is attributed to DDoS-as-a-service (booter/stressor) infrastructure, which has persisted despite multi-country law enforcement action.
  • Ars notes free DDoS protection services exist, making the prolonged outage duration unexplained.

Hacker News Comment Review

  • Commenters question architecture: whether reliance on a single cloud provider without proper DDoS mitigation is a design failure, with residential proxy volume cited as the practical blocker.
  • The “cross-border” framing drew skepticism about editorial accuracy, though one reply defended it as a reference to physical server jurisdiction and geopolitical threat actors.

Notable Comments

  • @esseph: high-volume residential proxy DDoS is genuinely hard to mitigate even on major cloud infrastructure.

Original | Discuss on HN