Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Illustration depicting the Linux CopyFail vulnerability enabling root access exploits alongside Ubuntu's DDoS-induced outage.
Picha iliyoundwa na AI

Linux CopyFail exploit threatens root access amid Ubuntu outage

Picha iliyoundwa na AI

A critical Linux vulnerability known as CopyFail, tracked as CVE-2026-31431, allows attackers to gain root access on systems running kernels since 2017. Publicly released exploit code has heightened risks for data centers and personal devices. Ubuntu's infrastructure has been offline for over a day due to a DDoS attack, hampering security communications.

Researchers have disclosed CopyFail, a dangerous exploit affecting virtually all Linux releases, including those since 2017. Dubbed CVE-2026-31431, it enables hackers to seize root control on PCs and servers. Patches are available, but many machines remain exposed as defenders rush to apply them, according to details first reported by WIRED on May 1, 2026. An hour of scanning suffices for exploitation, TechRadar noted the same day, urging immediate patching to avert severe compromises. Canonical's status page stated: “Canonical’s web infrastructure is under a sustained, cross-border attack and we are working to address it.” Servers like security.ubuntu.com, archive.ubuntu.com, and ubuntu.com have been inaccessible since Thursday morning, May 1. A pro-Iranian group claimed responsibility on Telegram for the DDoS using the Beam stressor service, which has also targeted eBay recently. The outage followed the exploit code's release, limiting Ubuntu's ability to issue guidance. Updates remain accessible via mirror sites, though officials have stayed silent beyond the status update. Stressor services, fronts for paid DDoS attacks, persist despite law enforcement efforts.

Watu wanasema nini

X discussions highlight alarm over the CopyFail (CVE-2026-31431) vulnerability enabling unprivileged root access on major Linux distributions since 2017 via a simple Python exploit. Users urge immediate kernel patching or module disablement, noting evasion of file integrity monitoring. Canonical's DDoS-induced infrastructure outage, claimed by pro-Iran 313 Team, delays security updates. Security experts provide mitigations and threat intel, while some share demos and express frustration.

Makala yanayohusiana

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
Picha iliyoundwa na AI

Researchers discover SSHStalker botnet infecting Linux servers

Imeripotiwa na AI Picha iliyoundwa na AI

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

Four days after the CopyFail (CVE-2026-31431) exploit disclosure disrupted Ubuntu services, the US government warned of its critical risks to Linux systems, urging immediate patching amid public exploit code.

Imeripotiwa na AI

Red Hat has provided an official link to information on the CopyFail vulnerability, known as CVE-2026-31431. The security page details a fix for the local privilege escalation issue and specifies affected versions. This follows a user inquiry urging faster publication of a patch.

Daemon Tools, a popular disk image mounting app, was compromised in a supply-chain attack starting April 8, delivering malware through official updates. Security firm Kaspersky reported infections on thousands of machines across over 100 countries. Users are urged to scan their systems immediately.

Imeripotiwa na AI

Elastic Security Labs has detailed the evolution of Linux rootkits in a two-part research series published on March 5, 2026. These modern threats exploit kernel features like eBPF and io_uring to remain hidden in cloud, IoT, and server environments. The research highlights how such rootkits evade traditional detection methods.

Jumamosi, 9. Mwezi wa tano 2026, 20:17:43

New dirty frag exploit grants root access on linux systems

Jumatano, 22. Mwezi wa nne 2026, 09:46:30

Microsoft patches critical ASP.NET Core vulnerability on macOS and Linux

Ijumaa, 3. Mwezi wa nne 2026, 10:14:58

OpenClaw patches severe vulnerability granting admin access

Ijumaa, 13. Mwezi wa tatu 2026, 18:03:59

Veeam patches three critical security flaws in backup servers

Jumamosi, 14. Mwezi wa pili 2026, 06:39:37

SSHStalker botnet uses IRC to target Linux servers

Jumanne, 10. Mwezi wa pili 2026, 19:39:23

New Linux botnet SSHStalker uses IRC for command-and-control

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa