
The official Ubuntu account on X (formerly Twitter) was briefly compromised by unknown attackers who used it to promote a fake AI agent and send people to a well-built website where they could share their crypto wallet.
A few days before this incident, Canonical wanted to position Ubuntu as a privacy-friendly, local-first AI platform. Attackers weaponized that exact narrative within days.
A suspected compromise of Ubuntu’s official X account pushed a fake “Ubuntu AI agent” called ‘Numbat,’ directing users to a malicious crypto phishing website designed to steal wallet access.
The attack came shortly after Canonical revealed plans to expand AI integration inside Ubuntu, and after the company was recovering from a prolonged DDoS campaign targeting its infrastructure.
On May 7, users noticed a suspicious thread posted from what appeared to be Ubuntu’s official X account. The posts announced “Numbat,” described as “Ubuntu’s newest AI agent built on Solana.”
At first glance, the announcement seemed plausible. Canonical had already been discussing Ubuntu’s AI direction publicly, and the branding referenced Ubuntu’s “Noble Numbat” naming convention.
Instead of using crude phishing tactics, they built a layered narrative that felt consistent with existing Ubuntu discussions. The X post used professional visuals, authentic branding, and language that closely aligned with Canonical’s previous messaging.
The phishing site operated under the domain “ai-ubuntu[.]com,” which looked enough like an official Canonical subdomain to likely fool distracted users. The attackers also disabled replies on the X thread, making it harder for users to publicly warn others about the scam.
The campaign's real objective emerged only after users interacted with the site. Visitors encountered language suggesting that early participants might qualify for future “$UM” token allocations, accompanied by urgent phrases such as “Snapshot approaching.”
The wording followed a familiar crypto scam formula: create a sense of urgency, imply exclusivity and reward early adopters. When users clicked buttons like “Check eligibility” or “Explore Ubuntu AI,” the site prompted them to connect cryptocurrency wallets.
Attackers likely intended to harvest wallet permissions, steal assets or collect sensitive account information through the approval process.
The phishing campaign was launched shortly after Canonical faced a DDoS attack that disrupted Ubuntu infrastructure for nearly five days.
Services including ubuntu.com, Launchpad, and Snap-related systems suffered outages or instability during the incident. According to an It’s Foss report, a group identifying itself as “313 Team” reportedly claimed responsibility for the attacks, although Canonical did not officially confirm attribution.
Canonical had not yet released a detailed public post-incident analysis explaining exactly what happened with the X account, and the post made by the attackers was quickly deleted. The good news is that the DDoS attack has stopped, and all services are up and running.
Answer: No. The “Numbat” AI project was part of a phishing campaign impersonating Ubuntu and Canonical.
Answer: Canonical has not publicly confirmed the exact cause at the time of reporting, but the account appeared to be compromised or abused to spread the scam for a very short time.
Answer: A fake website designed to mimic Ubuntu AI pages and trick users into connecting crypto wallets.
Answer: No evidence suggested Ubuntu systems or repositories were breached. The incident centered on phishing and web-related attacks.
Answer: Verify domains carefully, avoid connecting wallets to unknown sites and treat AI-themed crypto promotions with skepticism.
tags
Silviu is a seasoned writer who followed the technology world for almost two decades, covering topics ranging from software to hardware and everything in between.
View all posts