Feeds

Fedora servers breached after external compromise

Open sourcer account hacked

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Servers belonging to the Fedora Project were breached over the weekend by an unknown hacker who gained access though a team member's account.

The compromise of fedorapeople.org meant that the attacker had the ability, however briefly, to push changes to Fedora's SCM system. There's no evidence any such updates were made or that Fedora's systems were subject to any vulnerabilities or exploits.

“While the user in question had the ability to commit to Fedora SCM, the Infrastructure Team does not believe that the compromised account was used to do this, or cause any builds or updates in the Fedora build system,” Fedora Project Leader Jared Smith wrote. “The Infrastructure Team believes that Fedora users are in no way threatened by this security breach and we have found no evidence that the compromise extended beyond this single account.”

The breach was discovered on Saturday when an unnamed Fedora contributor received an email informing him that details for his Fedora account had been changed. Investigators quickly determined the account credentials “were compromised externally” and restricted access to the account. They also took filesystem snapshots of all systems the account had access to and audited logs immediately following the breach.

It's not the first time an open-source project has been attacked. Last month, hackers breached the main server hosting ProFTPD and remained undetected for three days, causing anyone who downloaded the popular open-source file transfer application during that time to be infected with a backdoor that granted unauthorized access to their systems.

Also last month, the main source-code repository for the Free Software Foundation was shut down following an attack that compromised some of the website's account passwords. And in April, hackers penetrated the heavily fortified servers for Apache.org, the second attack against the open-source project in eight months.

Fedora's Smith said investigators planned to delve deeper into the breach and would report any new findings. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
SHELLSHOCKED: Fortune 1000 outfits Bash out batches of patches
CloudPassage points to 'pervasive' threat of Bash bug
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.