伊朗支持的黑客将DDoS攻击变成敲诈勒索,Ubuntu.com网站仍然瘫痪。
Pro-Iran crew turns DDoS into shakedown as Ubuntu.com stays down

原始链接: https://www.theregister.com/2026/05/01/canonical_confirms_ubuntu_infrastructure_under/

Canonical(Ubuntu的母公司)目前正面临来自伊朗黑客组织“伊拉克伊斯兰网络抵抗力量(313团队)”持续的DDoS攻击。攻击始于12多小时前,并持续扰乱Ubuntu主网站和多个子域名,阻止用户下载该发行版或访问Canonical帐户。 313团队最初声称对服务中断负责,现在似乎已转向敲诈勒索,要求通过提供的Session ID进行联系,并威胁如果被忽略将继续攻击。该组织此前曾攻击过eBay和BlueSky等公司。 虽然针对位于伦敦的Canonical的动机尚不清楚,但Ubuntu作为Linux发行版的受欢迎程度可能是一个因素。Canonical报告其团队正在努力恢复服务,并承诺通过官方渠道发布更新。

## Ubuntu.com DDoS 攻击总结 Ubuntu.com 遭遇了一场持续的 DDoS 攻击,据报道由一个亲伊朗组织实施,导致网站中断和 Snap 包更新问题。 攻击 Canonical(总部位于英国的 Ubuntu 公司)的动机尚不清楚。 推测范围从对西方实体的象征性攻击——Canonical 被视为“西方代理人”——到一种拉紧英国和美国关系的策略。 一些评论员认为 Ubuntu 只是因为其在技术社区内的知名度而被选择的目标,希望以此获得支持。 还有人指出,与其他科技公司相比,Ubuntu 的服务器相对容易访问。 关于与伊朗的直接联系存在争议,一些人认为攻击者可能只是寻求经济利益,并利用亲伊朗的身份作为掩护。 这次攻击凸显了政治动机的网络攻击日益增多以及防御这些攻击的挑战,即使对于成熟的公司也是如此。
相关文章

原文

Canonical says its web infrastructure is under attack after a pro-Iran hacktivist group instructed its members to target the open source giant.

"I can confirm that Canonical's web infrastructure is under a sustained, cross-border Distributed Denial of Service (DDoS) attack" a Canonical spokesperson told The Register

"Our teams are working to restore full availability to all affected services. We will provide updates in our official channels as soon as we are able to."

Known best for managing the development of Ubuntu, the distro's main website is down at the time of writing, and has been for several hours.

The hacktivist group The Islamic Cyber ​​Resistance in Iraq, aka 313 Team claimed responsibility for the 503 errors Ubuntu's website was returning on Thursday evening, announcing via its Telegram channel that the attack was scheduled to persist for four hours.

More than 12 hours later, the attack continues to disrupt Ubuntu's main website and many of its subdomains, although some, including its Archive and Discourse pages, remain up and running.

313 Team sent a follow-up message to its Telegram group, directed at Canonical, which indicates the group is veering away from hacktivism and toward full-on extortion: "There is a simple way out. We have emailed you with our Session Contact ID. If you fail to reach out, we will continue our assault. You are in an awful position, don't be foolish."

The service disruption at Ubuntu means users cannot download any versions of its distros through the usual channels, nor can they log into their Canonical accounts.

Canonical promised to provide regular updates when it has new information to share.

313 Team has claimed responsibility for similar DDoS attacks on the likes of eBay's Japan and US divisions, as well as BlueSky in just the past month alone.

Why the group is targeting London-based Canonical remains unclear and no reason was given via its Telegram channel. It is presumably because Ubuntu is one of the most popular Linux distros. ®

联系我们 contact @ memedata.com