Movatterモバイル変換


[0]ホーム

URL:


SECURITYWEEK NETWORK:

ICS:

SecurityWeek
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Arch Linux Project Responding to Week-Long DDoS Attack

The Arch Linux Project has been targeted in a DDoS attack that disrupted its website, repository, and forums.

Arch Linux DDoS attack

For more than a week, the Arch Linux Project’s maintainers have been responding to a sustained distributed denial-of-service (DDoS) attack that impacted most of the project’s resources.

The project’s maintainers first confirmed that the outage was caused by a DDoS attack on August 16, noting that the Arch User Repository (AUR), the Arch Linux main webpage, and the forums were down.

“As you might be aware some of our services (AUR, Forums, main website) are currently affected by a DDoS attack. We are aware of the issue and are actively working on mitigation efforts,” the maintainerssaid.

“We are aware of the problems that this creates for our end users and will continue to actively work with our hosting provider to mitigate the attack. We are also evaluating DDoS protection providers while carefully considering factors including cost, security, and ethical standards,” they said in anupdate last week.

The services have been gradually restored over the weekend, as reflected on the project’sstatus page. Currently, the user repository and the forums are fully operational, while the website continues to be affected, albeit it is accessible.

“We are suffering from partial outages due DDoS attacks […]. Some services may wrongly be displayed as ‘Down’ due to some of the mitigation tactics. See our announcement for a more detailed update on the situation,” the page reads.

The incident also impacted package mirrors, as the mirror list endpoint that some tools rely on is also hosted on the website, and the maintainers directed users to switch to mirrors listed in thepacman-mirrorlist package.

For installation images downloaded from mirrors, the maintainers recommend that users perform integrity and signature checks.

Advertisement. Scroll to continue reading.

The Arch Linux Project did not share technical details on the attack, such as origin and response tactics, citing the ongoing efforts to mitigate it.

Related:RapperBot Botnet Disrupted, American Administrator Indicted

Related:‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks

Related:DDoS Attacks Blocked by Cloudflare in 2025 Already Surpass 2024 Total

Related:Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

More from

Latest News

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

This session explores how GRC and SOC move as one during high-pressure incidents, turning shared threat intelligence into faster action, clearer communication, and stronger organizational resilience.

Register

This two-day event pushes the boundaries of security discussions by exploring the implications and applications of predictive AI, machine learning, and automation in modern cybersecurity programs.

Register

People on the Move

Mozilla has named Stephanie Domas as VP of Security.

Shannon Lawson has been appointed the Chief Information Security Officer of the City of San Antonio.

LogicGate has appointed Maureen Noonan as CRO and Michael Schultz as CMO.

More People On The Move

Expert Insights

Boardroom conversations about cyber can no longer be siloed apart from strategy, operations, or geopolitics.

AI has given cybercriminals the ability to operate like Fortune‑500‑scale marketing departments—except their product is account takeover, data theft, and identity fraud.

Behavioral detection allows defenders to recognize activity patterns like privilege escalation, credential theft, and lateral movement—often ahead of encryption or data exfiltration.

When leaders redefine power as trust instead of control, teams unlock their potential — and organizations find their edge.

Agentic AI speeds operations, but requires clear goals, least privilege, auditability, red‑teaming, and human oversight to manage opacity, misalignment, and misuse.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecuritynews, threats, and expert insights. Unsubscribe at any time.


[8]ページ先頭

©2009-2025 Movatter.jp