Linux maintainers were infected for 2 years by SSH-dwelling backdoor with massive reach
Briefly

Sophisticated malware infected kernel.org servers from 2009-2011, compromising user credentials and enabling spam and malicious activities.
Attackers obtained cryptographic hashes for 551 user accounts on kernel.org, converting half into plaintext passwords using password-cracking techniques.
Infection revealed in 2011 compromised 448 accounts with root system access, and the public understanding remains limited due to lack of detailed disclosure.
Read at arstechnica.com
[
|
]