Skip to content
FOSSBYTES TECH SIMPLIFIED LOGO
Search
  • News
  • Explained
  • Geek
  • Gaming
  • Streaming
  • How To
  • Top X
  • Tools
  • Jobs
Menu
  • News
  • Explained
  • Geek
  • Gaming
  • Streaming
  • How To
  • Top X
  • Tools
  • Jobs
Facebook Twitter Instagram
Menu
  • News
  • Explained
  • Geek
  • Gaming
  • Streaming
  • How To
  • Top X
  • Tools
  • Jobs
FOSSBYTES TECH SIMPLIFIED LOGO
Search
Close
Join Us On Telegram

  • News, Security

Canonical’s GitHub Account ‘Hacked’ But Ubuntu Repos Are Safe

  • Manisha Priyadarshini Manisha Priyadarshini
  • July 8, 2019
Share on twitter
Tweet
Share on facebook
Share
Share on whatsapp
WhatsApp
canonical_ubuntu hacked

Canonical, the Ubuntu-maker, has confirmed that their GitHub account was hacked on July 6. The Ubuntu security team issued a statement saying that the credentials of a Canonical owned account on GitHub were compromised.

The unknown attackers used the compromised account to “create repositories and issues among other activities.” The company has now removed the hijacked account from Canonical organization in GitHub.

Ubuntu source code is safe so far

While the extent of the breach is still being investigated, the security team said that there is no indication that the source code or PII was affected.

Moreover, the Launchpad infrastructure where the Ubuntu distribution is built and maintained has been disconnected from GitHub. There is also no sign that it has been affected.

The mirror of the hacked Canonical GitHub account shows that the attacker created 11 new GitHub repositories sequentially named CAN_GOT_HAXXD_1. Surprisingly, those repositories were empty.

So it seems that the hacking incident was limited to defacement only as there is no proof of existing data being changed or deleted.

Find your dream job

Meanwhile, a cyber-security firm called Bad Packets, tweeted that it detected internet-wide scans for Git configuration files just two days before the incident.

I'm interested if there's any correlation with the recent mass scanning for exposed git config files. https://t.co/ckGt158CXc

— Bad Packets (@bad_packets) July 7, 2019

Sometimes, such files contain credentials for Git accounts, like the ones used to manage the account on GitHub. So there are chances that these two incidents could be related.

However, we will have to wait until the Ubuntu security team finishes its investigation and publishes its final report.

Also Read: Google Researcher Finds Nasty iMessage Bug That ‘Bricks’ iPhone
Manisha Priyadarshini

Manisha Priyadarshini

An Editor and a Tech Journalist with a software development background. I am a big fan of technology and memes. At Fossbytes, I cover all aspects of tech but my specific area of interest is Programming and Development.

Find your dream job

More From Fossbytes

Latest On Fossbytes

Stranger Things season 4 part 1 release date and time

“Stranger Things” Season 4 Part 1 Release Date & Time: Will It Stream On Netflix?

Will There Be A Panchayat Season 3?

Will There Be A Panchayat Season 3?

Starlink RV Plan Launched But Someone Already Mounted One On His Car

Starlink RV Plan Launched, But Someone Already Mounted One In His Car

where to watch jojo's bizarre adventure for free

Where To Watch “JoJo’s Bizarre Adventure” Anime Online [For Free]

Chrome Vulnerabilities

A Shady Security Company Sold Chrome Vulnerabilities To Govt. Hackers

Work at your dream company with Fossbytes Jobs

FOSSBYTES
  • About Us
  • Privacy Policy
  • Cookie Policy
Facebook Twitter Instagram
  • Contact Us
  • Work With Us

Learn Something New Today

Academy

Fossbytes Media Pvt Ltd © 2022

FOSSBYTES
Facebook Twitter Instagram

Learn Something New Today

Academy
  • About Us
  • Privacy Policy
  • Cookie Policy
  • Contact Us
  • Work With Us

Fossbytes Media Pvt Ltd © 2022