Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
AI द्वारा उत्पन्न छवि

Linux CopyFail exploit threatens root access amid Ubuntu outage

AI द्वारा उत्पन्न छवि

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Researchers have disclosed CopyFail, a dangerous exploit affecting virtually all Linux releases, including those since 2017. Dubbed CVE-2026-31431, it enables hackers to seize root control on PCs and servers. Patches are available, but many machines remain exposed as defenders rush to apply them, according to details first reported by WIRED on May 1, 2026. An hour of scanning suffices for exploitation, TechRadar noted the same day, urging immediate patching to avert severe compromises. Canonical's status page stated: “Canonical’s web infrastructure is under a sustained, cross-border attack and we are working to address it.” Servers like security.ubuntu.com, archive.ubuntu.com, and ubuntu.com have been inaccessible since Thursday morning, May 1. A pro-Iranian group claimed responsibility on Telegram for the DDoS using the Beam stressor service, which has also targeted eBay recently. The outage followed the exploit code's release, limiting Ubuntu's ability to issue guidance. Updates remain accessible via mirror sites, though officials have stayed silent beyond the status update. Stressor services, fronts for paid DDoS attacks, persist despite law enforcement efforts.

लोग क्या कह रहे हैं

X discussions highlight alarm over the CopyFail (CVE-2026-31431) vulnerability enabling unprivileged root access on major Linux distributions since 2017 via a simple Python exploit. Users urge immediate kernel patching or module disablement, noting evasion of file integrity monitoring. Canonical's DDoS-induced infrastructure outage, claimed by pro-Iran 313 Team, delays security updates. Security experts provide mitigations and threat intel, while some share demos and express frustration.

संबंधित लेख

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
AI द्वारा उत्पन्न छवि

Researchers discover SSHStalker botnet infecting Linux servers

AI द्वारा रिपोर्ट किया गया AI द्वारा उत्पन्न छवि

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Four days after the CopyFail (CVE-2026-31431) exploit disclosure disrupted Ubuntu services, the US government warned of its critical risks to Linux systems, urging immediate patching amid public exploit code.

AI द्वारा रिपोर्ट किया गया

Red Hat has provided an official link to information on the CopyFail vulnerability, known as CVE-2026-31431. The security page details a fix for the local privilege escalation issue and specifies affected versions. This follows a user inquiry urging faster publication of a patch.

Daemon Tools, a popular disk image mounting app, was compromised in a supply-chain attack starting April 8, delivering malware through official updates. Security firm Kaspersky reported infections on thousands of machines across over 100 countries. Users are urged to scan their systems immediately.

AI द्वारा रिपोर्ट किया गया

Elastic Security Labs has detailed the evolution of Linux rootkits in a two-part research series published on March 5, 2026. These modern threats exploit kernel features like eBPF and io_uring to remain hidden in cloud, IoT, and server environments. The research highlights how such rootkits evade traditional detection methods.

यह वेबसाइट कुकीज़ का उपयोग करती है

हम अपनी साइट को बेहतर बनाने के लिए विश्लेषण के लिए कुकीज़ का उपयोग करते हैं। अधिक जानकारी के लिए हमारी गोपनीयता नीति पढ़ें।
अस्वीकार करें