Encrypted copies of Bitbucket SSH keys leaked(bitbucket.org) |
Encrypted copies of Bitbucket SSH keys leaked(bitbucket.org) |
However, it seems to be about their host keys. The article seems down for me, but https://bitbucket.org/blog/ has a title "ACTION REQUIRED: Update your Bitbucket Cloud SSH Host Keys".
That means that you need to drop their entries from your known_hosts file or you risk a MITM attack on an insecure network.
Considering we usually blindly accept new SSH hosts without checking for fingerprints (eg on new or reinstalled machines), it's probably unlikely this will be exploited in the wild since it already could have been.
Something as simple as confirm-fingerprint-over-https (eg. look for https://ssh-host/.host-ssh-fingerprint) could work if enough ssh clients used it.