this post was submitted on 27 Oct 2025
        
      
      124 points (100.0% liked)
      Linux
    9942 readers
  
      
      2056 users here now
      A community for everything relating to the GNU/Linux operating system (except the memes!)
Also, check out:
Original icon base courtesy of lewing@isc.tamu.edu and The GIMP
        founded 2 years ago
      
      MODERATORS
      
    you are viewing a single comment's thread
view the rest of the comments
    view the rest of the comments
Nobody has been claiming responsibility. Some of the AUR forum peoples think it's butthurt malware devs who got caught uploading malware, but it's just a shot in the dark.
https://status.archlinux.org/
Been on and off for months now.
I wonder if it could be a state actor? I can imagine that the powers that be in MANY countries could be motivated to keep users away from operating system software that isn’t spyware.
Then why go against the AUR and not the official mirrors? The former isn't always exactly the epitome of securely packaged trusted applications
Just spitballing, because honestly the amount of effort that must go into sustaining this attack in the long term just baffles me. Like, why?
It costs, like $10 to rent a botnet for a couple-hour attack.
If it's blocking AUR updates, it could be an attempt to keep some patches to certain exploits from going out? But it seems unlikely that the cost of a ddos is worth the tiny number of possibly vulnerable AUR users out there...
If people just used Hannah Montana Linux then we wouldn't have these problems.