Ubuntu and Canonical Servers Targeted in Sustained DDoS Attack

Servers operated by Ubuntu and its parent company Canonical were taken offline on Thursday morning and have remained inaccessible for more than 24 hours. The outage has disrupted normal operations, including OS updates and communications, following the botched disclosure of a major vulnerability.

Attempts to access most Ubuntu and Canonical webpages or download OS updates from Ubuntu servers have consistently failed during this period. However, updates from mirror sites have continued to function normally.

Canonical Confirms Cross-Border Cyberattack

A status update on Canonical’s official page states:

“Canonical’s web infrastructure is under a sustained, cross-border attack and we are working to address it.”

Despite the ongoing disruption, Ubuntu and Canonical officials have not issued any further public statements since the outage began.

Pro-Iran Group Claims Responsibility for DDoS Attack

A group sympathetic to the Iranian government has taken credit for the attack. According to posts on Telegram and other social media platforms, the group executed a DDoS attack using Beam, a service marketed as a server stress-testing tool but widely known as a front for paid takedown services.

In recent weeks, the same group has claimed responsibility for similar DDoS attacks on eBay and other major platforms.

Impact on Ubuntu Users and Services

  • Access to Ubuntu and Canonical webpages remains unavailable.
  • OS updates from primary Ubuntu servers are currently inaccessible.
  • Mirror sites continue to provide updates without interruption.
  • Canonical has not provided further details on the attack or its resolution timeline.

As of now, the full extent of the disruption and the timeline for recovery remain unclear.