Linux websites down after breach

Linux websites are taken offline after successful hacks on company servers.

Linux

The Linux Foundation and related websites have been taken down following a compromise discovered on 8 September.

The websites were taken offline "in the interest of extreme caution and security best practices," the Linux Foundation said on a holding page.

"We are in the process of restoring services in a secure manner as quickly as possible," the organisation said.

"As with any intrusion and as a matter of caution, you should consider the passwords and SSH [Secure Shell] keys that you have used on these sites compromised. If you have reused these passwords on other sites, please change them immediately."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The foundation said it was auditing all systems and will update the statement once more information emerges.

"The Linux Foundation infrastructure houses a variety of services and programs including Linux.com, Open Printing, Linux Mark, Linux Foundation events and others, but does not include the Linux kernel or its code repositories," it added.

The body said it believes the breach on LinuxFoundation.org was related to an intrusion on Kernel.org discovered last month.

We currently believe that the source code repositories were unaffected.

The Kernel.org website currently says it is down for maintenance. In August, a number of servers in the Kernel.org infrastructure were hacked.

"While we currently believe that the source code repositories were unaffected, we are in the process of verifying this and taking steps to enhance security across the kernel.org infrastructure," a note previously on Kernel.org read.

Advertisement - Article continues below

According to the Hacker News, the Phalanx rootkit was used to eventually gain root access to Kernel.org systems.

Authorities in both the US and Europe have been notified.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/operating-systems/28025/best-linux-distros-2019-the-finest-open-source-operating-systems-around
operating systems

Best Linux distros 2019

24 Dec 2019
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/open-source/34540/view-from-the-airport-linux-open-networking-summit-2019
open source

View from the airport: Linux Open Networking Summit 2019

1 Oct 2019

Most Popular

Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/operating-systems/microsoft-windows/354526/memes-and-viking-funerals-the-internet-reacts-to-the
Microsoft Windows

Memes and Viking funerals: The internet reacts to the death of Windows 7

14 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020