Canonical (Ubuntu) sotto attacco DDoS con i servizi online che non funzionano da ieri proprio mentre la vulnerabilità Copy Fail è stata svelata ed è per ora unpatched. L'attacco è stato rivendicato da "Islamic Cyber Resistance in Iraq – 313 Team".

~ ❯ dig ubuntu.com
; <<>> DiG 9.20.22 <<>> ubuntu.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5065
;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;ubuntu.com.			IN	A

;; ANSWER SECTION:
ubuntu.com.		38	IN	A	185.125.190.20
ubuntu.com.		38	IN	A	185.125.190.21
ubuntu.com.		38	IN	A	185.125.190.29

;; Query time: 9 msec
;; SERVER: 8.8.8.8#53(8.8.8.8) (UDP)
;; WHEN: Fri May 01 14:38:59 CEST 2026
;; MSG SIZE  rcvd: 87

~ ❯ curl -I https://ubuntu.com
curl: (56) Recv failure: Connection reset by peer

~ ❯ ipinfo 185.125.190.20
Core
- IP           185.125.190.20
- Anycast      false
- Hostname     website-content-cache-1.ps5.canonical.com
- City         London
- Region       England
- Country      United Kingdom (GB)
- Currency     GBP (£)
- Location     51.5085,-0.1257
- Organization AS41231 Canonical Group Limited
- Postal       E1W
- Timezone     Europe/London