The post Chinese-linked hackers infiltrated F5’s systems in late 2023 appeared on BitcoinEthereumNews.com. Hackers linked to China’s state-backed cyber units infiltrated F5’s internal networks in late 2023 and stayed hidden until this August, according to Bloomberg. The Seattle-based cybersecurity company admitted in filings that its systems had been compromised for nearly two years, allowing attackers “long-term, persistent access” to its internal infrastructure. The breach reportedly exposed source code, sensitive configuration data, and information about undisclosed software vulnerabilities in its BIG-IP platform, a technology that powers the networks of 85% of Fortune 500 companies and many US federal agencies. The hackers broke in through F5’s own software, which had been left exposed online after employees failed to follow internal security policies. The attackers exploited that weak point to enter and roam freely inside systems that should have been locked down. F5 company told customers that the oversight directly violated the same cyber guidelines the company teaches its clients to follow. When the news broke, F5’s shares fell more than 10% on October 16, wiping out millions in market value. “Since that vulnerability information is out there, everyone using F5 should assume they’re compromised,” said Chris Woods, a former security executive with HP who is now founder of CyberQ Group Ltd., a cybersecurity services firm in the UK. Hackers used F5’s own technology to maintain stealth and control F5 sent customers on Wednesday a threat hunting guide for a type of malware called Brickstorm used by Chinese state-backed hackers, according to Bloomberg. Mandiant, which was hired by F5, confirmed that Brickstorm allowed hackers to move quietly through VMware virtual machines and deeper infrastructure. After securing their foothold, the intruders stayed inactive for over a year, an old but effective tactic meant to outwait the company’s security log retention period. Logs, which record every digital trace, are often deleted after 12 months to save costs. Once… The post Chinese-linked hackers infiltrated F5’s systems in late 2023 appeared on BitcoinEthereumNews.com. Hackers linked to China’s state-backed cyber units infiltrated F5’s internal networks in late 2023 and stayed hidden until this August, according to Bloomberg. The Seattle-based cybersecurity company admitted in filings that its systems had been compromised for nearly two years, allowing attackers “long-term, persistent access” to its internal infrastructure. The breach reportedly exposed source code, sensitive configuration data, and information about undisclosed software vulnerabilities in its BIG-IP platform, a technology that powers the networks of 85% of Fortune 500 companies and many US federal agencies. The hackers broke in through F5’s own software, which had been left exposed online after employees failed to follow internal security policies. The attackers exploited that weak point to enter and roam freely inside systems that should have been locked down. F5 company told customers that the oversight directly violated the same cyber guidelines the company teaches its clients to follow. When the news broke, F5’s shares fell more than 10% on October 16, wiping out millions in market value. “Since that vulnerability information is out there, everyone using F5 should assume they’re compromised,” said Chris Woods, a former security executive with HP who is now founder of CyberQ Group Ltd., a cybersecurity services firm in the UK. Hackers used F5’s own technology to maintain stealth and control F5 sent customers on Wednesday a threat hunting guide for a type of malware called Brickstorm used by Chinese state-backed hackers, according to Bloomberg. Mandiant, which was hired by F5, confirmed that Brickstorm allowed hackers to move quietly through VMware virtual machines and deeper infrastructure. After securing their foothold, the intruders stayed inactive for over a year, an old but effective tactic meant to outwait the company’s security log retention period. Logs, which record every digital trace, are often deleted after 12 months to save costs. Once…

Chinese-linked hackers infiltrated F5’s systems in late 2023

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Hackers linked to China’s state-backed cyber units infiltrated F5’s internal networks in late 2023 and stayed hidden until this August, according to Bloomberg. The Seattle-based cybersecurity company admitted in filings that its systems had been compromised for nearly two years, allowing attackers “long-term, persistent access” to its internal infrastructure.

The breach reportedly exposed source code, sensitive configuration data, and information about undisclosed software vulnerabilities in its BIG-IP platform, a technology that powers the networks of 85% of Fortune 500 companies and many US federal agencies.

The hackers broke in through F5’s own software, which had been left exposed online after employees failed to follow internal security policies. The attackers exploited that weak point to enter and roam freely inside systems that should have been locked down.

F5 company told customers that the oversight directly violated the same cyber guidelines the company teaches its clients to follow. When the news broke, F5’s shares fell more than 10% on October 16, wiping out millions in market value.

“Since that vulnerability information is out there, everyone using F5 should assume they’re compromised,” said Chris Woods, a former security executive with HP who is now founder of CyberQ Group Ltd., a cybersecurity services firm in the UK.

Hackers used F5’s own technology to maintain stealth and control

F5 sent customers on Wednesday a threat hunting guide for a type of malware called Brickstorm used by Chinese state-backed hackers, according to Bloomberg.

Mandiant, which was hired by F5, confirmed that Brickstorm allowed hackers to move quietly through VMware virtual machines and deeper infrastructure. After securing their foothold, the intruders stayed inactive for over a year, an old but effective tactic meant to outwait the company’s security log retention period.

Logs, which record every digital trace, are often deleted after 12 months to save costs. Once those logs were gone, the hackers reactivated and pulled data from BIG-IP, including source code and vulnerability reports.

F5 said that while some customer data was accessed, it has no real evidence that hackers changed its source code or used the stolen information to exploit clients.

F5’s BIG-IP platform handles load balancing and network security, routing digital traffic and shielding systems from intrusion.

US and UK governments issue emergency warnings

The US Cybersecurity and Infrastructure Security Agency (CISA) called the incident a “significant cyber threat targeting federal networks.” In an emergency directive issued on Wednesday, CISA ordered all federal agencies to identify and update their F5 products by October 22.

The UK’s National Cyber Security Centre also issued an alert about the breach on Wednesday, warning that hackers could use their access to F5 systems to exploit the company’s technology and to identify additional vulnerabilities.

Following the disclosure, F5 CEO Francois Locoh-Donou held briefings with customers to explain the scope of the breach. Francois confirmed that the company had called in CrowdStrike and Google’s Mandiant to assist alongside law enforcement and government investigators.

Officials familiar with the probe allegedly told Bloomberg that the Chinese government was behind the attack. But a Chinese spokesperson dismissed the accusation as “groundless and made without evidence.”

Ilia Rabinovich, Sygnia’s vice president of cybersecurity consulting, said that in the case Sygnia disclosed last year, hackers hid inside F5’s appliances and used them as a “command and control” base to infiltrate victim networks undetected. “There is a potential for it to evolve into something that is massive, because numerous organizations deploy those devices,” he said.

Claim your free seat in an exclusive crypto trading community – limited to 1,000 members.

Source: https://www.cryptopolitan.com/ccp-hackers-hid-inside-f5-networks-for-years/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Litecoin Fluctuates Below The $116 Threshold

Litecoin Fluctuates Below The $116 Threshold

The post Litecoin Fluctuates Below The $116 Threshold appeared on BitcoinEthereumNews.com. Sep 17, 2025 at 23:05 // Price Litecoin price analysis by Coinidol.com: LTC price has slipped below the moving average lines after hitting resistance at $120. Litecoin price long-term prediction: bearish The 21-day SMA support helped to alleviate the selling pressure. In other words, the price of the cryptocurrency is above the 21-day SMA support but below the 50-day SMA barrier. This suggests that Litecoin will be trapped in a narrow range for a few days. If the 21-day SMA support or the 50-day SMA barrier is overreached, the cryptocurrency will trend upwards. For example, if the LTC price breaks through the 50-day SMA barrier, it will rise to a high of $124. Litecoin will fall to its current support level of $106 if the 21-day SMA support is broken. Technical Indicators  Resistance Levels: $100, $120, $140 Support Levels: $60, $40, $20 LTC price indicators analysis Litecoin’s price is squeezed between the moving average lines. It is unclear in which direction Litecoin will move. The moving average lines are horizontal in both charts. However, the price bars are limited to the distance between the moving averages. The price bars on the 4-hour chart are below the moving average lines. LTC/USD price chart – September 17, 2025 What is the next move for LTC? On the 4-hour chart, Litecoin is currently trading in a bearish trend zone. The altcoin is trading above the $112 support and below the moving average lines, which represent resistance at $116. The upward movement is hindered by the moving average lines, which are causing the price to oscillate within a limited range. Meanwhile, the signal for the cryptocurrency is bearish, with price bars below the moving average…
Share
BitcoinEthereumNews2025/09/18 08:15
CME to launch Solana and XRP futures options on October 13, 2025

CME to launch Solana and XRP futures options on October 13, 2025

The post CME to launch Solana and XRP futures options on October 13, 2025 appeared on BitcoinEthereumNews.com. Key Takeaways CME Group will launch futures options for Solana (SOL) and XRP. The launch date is set for October 13, 2025. CME Group will launch futures options for Solana and XRP on October 13, 2025. The Chicago-based derivatives exchange will add the new crypto derivatives products to its existing digital asset offerings. The launch will provide institutional and retail traders with additional tools to hedge positions and speculate on price movements for both digital assets. The futures options will be based on CME’s existing Solana and XRP futures contracts. Trading will be conducted through CME Globex, the exchange’s electronic trading platform. Source: https://cryptobriefing.com/cme-solana-xrp-futures-options-launch-2025/
Share
BitcoinEthereumNews2025/09/18 01:07
US-Israel airstrikes trigger 700% surge in Iran crypto outflows

US-Israel airstrikes trigger 700% surge in Iran crypto outflows

The post US-Israel airstrikes trigger 700% surge in Iran crypto outflows appeared on BitcoinEthereumNews.com. Homepage > News > Business > US-Israel airstrikes
Share
BitcoinEthereumNews2026/03/05 16:01