Ubuntu and Canonical Web Services Hit by DDoS Attack

Related

FBI Links Cybercriminals to Sharp Surge in Cargo Theft Attacks

What happened The FBI issued a public service announcement on...

China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

What happened ESET has documented a previously unknown China-linked APT...

Cosmetics Giant Rituals Confirms Data Breach of Customer Membership Records

What happened Netherlands-based cosmetics retailer Rituals has confirmed a data...

Organized Fraud Networks Exploit French Fintech Platforms to Launder Stolen Funds

What happened Group-IB researchers have identified a structured three-phase fraud...

Share

What happened

Canonical, the company behind the Ubuntu Linux distribution, experienced widespread service disruptions across its core web infrastructure on May 1, 2026, following a coordinated DDoS attack. The hacktivist group identifying itself as the Islamic Cyber Resistance in Iraq, known as the 313 Team, claimed responsibility. Canonical acknowledged the outages via its status page but had not published an official statement attributing the cause at time of publication.

More than a dozen services and domains were reported as down, including ubuntu.com, canonical.com, security.ubuntu.com, archive.ubuntu.com, developer.ubuntu.com, and portal.canonical.com. The Ubuntu Security APIs for CVEs and security notices were among the affected services, disrupting the automated vulnerability data and advisory feeds that patch management tools and security automation pipelines rely on globally.

The 313 Team has previously claimed responsibility for a DDoS attack against Bluesky in April 2026 and presents itself as conducting politically motivated attacks against Western and technology-linked targets.

Who is affected

System administrators, security automation pipelines, and patch management tools dependent on Ubuntu’s CVE and advisory APIs faced disrupted access to real-time vulnerability data during the outage. Organizations running Ubuntu in cloud and enterprise environments were affected by the unavailability of archive.ubuntu.com, which disrupted package installations and system update workflows.

Why CISOs should care

The disruption of Ubuntu’s security API endpoints is the most operationally significant element of this attack. Organizations that have automated their patching and vulnerability management workflows around Ubuntu’s CVE and advisory feeds faced a gap in their security data pipeline during the outage window. DDoS attacks against open-source infrastructure have an outsized impact compared to attacks against single commercial vendors, because the same services underpin security operations across thousands of organizations simultaneously.

The 313 Team’s back-to-back attacks on Bluesky and now Canonical also suggest an active and escalating campaign against Western technology infrastructure rather than isolated incidents.

3 practical actions

  1. Implement fallback vulnerability data sources for Ubuntu CVE and advisory feeds: During the outage, organizations dependent on Ubuntu’s security APIs had no automated path to current vulnerability data. Configure patch management and security automation tools to fall back to the National Vulnerability Database or the Open Source Vulnerability database when Ubuntu’s APIs are unavailable.
  2. Review operational dependencies on single-source open-source security feeds: The Canonical outage highlights a concentration risk in security data pipelines. Audit which security automation workflows have a single point of failure tied to a specific vendor’s API and implement redundancy for the most critical feeds.
  3. Track 313 Team activity given the group’s escalating targeting of technology infrastructure: The same group claimed the Bluesky DDoS attack weeks ago and has now targeted Canonical. Monitor threat intelligence feeds for further activity from this group, particularly if your organization operates publicly visible technology or open-source infrastructure that fits their targeting pattern.
e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts