The post Chinese-linked hackers infiltrated F5’s systems in late 2023 appeared on BitcoinEthereumNews.com. Hackers linked to China’s state-backed cyber units infiltrated F5’s internal networks in late 2023 and stayed hidden until this August, according to Bloomberg. The Seattle-based cybersecurity company admitted in filings that its systems had been compromised for nearly two years, allowing attackers “long-term, persistent access” to its internal infrastructure. The breach reportedly exposed source code, sensitive configuration data, and information about undisclosed software vulnerabilities in its BIG-IP platform, a technology that powers the networks of 85% of Fortune 500 companies and many US federal agencies. The hackers broke in through F5’s own software, which had been left exposed online after employees failed to follow internal security policies. The attackers exploited that weak point to enter and roam freely inside systems that should have been locked down. F5 company told customers that the oversight directly violated the same cyber guidelines the company teaches its clients to follow. When the news broke, F5’s shares fell more than 10% on October 16, wiping out millions in market value. “Since that vulnerability information is out there, everyone using F5 should assume they’re compromised,” said Chris Woods, a former security executive with HP who is now founder of CyberQ Group Ltd., a cybersecurity services firm in the UK. Hackers used F5’s own technology to maintain stealth and control F5 sent customers on Wednesday a threat hunting guide for a type of malware called Brickstorm used by Chinese state-backed hackers, according to Bloomberg. Mandiant, which was hired by F5, confirmed that Brickstorm allowed hackers to move quietly through VMware virtual machines and deeper infrastructure. After securing their foothold, the intruders stayed inactive for over a year, an old but effective tactic meant to outwait the company’s security log retention period. Logs, which record every digital trace, are often deleted after 12 months to save costs. Once… The post Chinese-linked hackers infiltrated F5’s systems in late 2023 appeared on BitcoinEthereumNews.com. Hackers linked to China’s state-backed cyber units infiltrated F5’s internal networks in late 2023 and stayed hidden until this August, according to Bloomberg. The Seattle-based cybersecurity company admitted in filings that its systems had been compromised for nearly two years, allowing attackers “long-term, persistent access” to its internal infrastructure. The breach reportedly exposed source code, sensitive configuration data, and information about undisclosed software vulnerabilities in its BIG-IP platform, a technology that powers the networks of 85% of Fortune 500 companies and many US federal agencies. The hackers broke in through F5’s own software, which had been left exposed online after employees failed to follow internal security policies. The attackers exploited that weak point to enter and roam freely inside systems that should have been locked down. F5 company told customers that the oversight directly violated the same cyber guidelines the company teaches its clients to follow. When the news broke, F5’s shares fell more than 10% on October 16, wiping out millions in market value. “Since that vulnerability information is out there, everyone using F5 should assume they’re compromised,” said Chris Woods, a former security executive with HP who is now founder of CyberQ Group Ltd., a cybersecurity services firm in the UK. Hackers used F5’s own technology to maintain stealth and control F5 sent customers on Wednesday a threat hunting guide for a type of malware called Brickstorm used by Chinese state-backed hackers, according to Bloomberg. Mandiant, which was hired by F5, confirmed that Brickstorm allowed hackers to move quietly through VMware virtual machines and deeper infrastructure. After securing their foothold, the intruders stayed inactive for over a year, an old but effective tactic meant to outwait the company’s security log retention period. Logs, which record every digital trace, are often deleted after 12 months to save costs. Once…

Chinese-linked hackers infiltrated F5’s systems in late 2023

Hackers linked to China’s state-backed cyber units infiltrated F5’s internal networks in late 2023 and stayed hidden until this August, according to Bloomberg. The Seattle-based cybersecurity company admitted in filings that its systems had been compromised for nearly two years, allowing attackers “long-term, persistent access” to its internal infrastructure.

The breach reportedly exposed source code, sensitive configuration data, and information about undisclosed software vulnerabilities in its BIG-IP platform, a technology that powers the networks of 85% of Fortune 500 companies and many US federal agencies.

The hackers broke in through F5’s own software, which had been left exposed online after employees failed to follow internal security policies. The attackers exploited that weak point to enter and roam freely inside systems that should have been locked down.

F5 company told customers that the oversight directly violated the same cyber guidelines the company teaches its clients to follow. When the news broke, F5’s shares fell more than 10% on October 16, wiping out millions in market value.

“Since that vulnerability information is out there, everyone using F5 should assume they’re compromised,” said Chris Woods, a former security executive with HP who is now founder of CyberQ Group Ltd., a cybersecurity services firm in the UK.

Hackers used F5’s own technology to maintain stealth and control

F5 sent customers on Wednesday a threat hunting guide for a type of malware called Brickstorm used by Chinese state-backed hackers, according to Bloomberg.

Mandiant, which was hired by F5, confirmed that Brickstorm allowed hackers to move quietly through VMware virtual machines and deeper infrastructure. After securing their foothold, the intruders stayed inactive for over a year, an old but effective tactic meant to outwait the company’s security log retention period.

Logs, which record every digital trace, are often deleted after 12 months to save costs. Once those logs were gone, the hackers reactivated and pulled data from BIG-IP, including source code and vulnerability reports.

F5 said that while some customer data was accessed, it has no real evidence that hackers changed its source code or used the stolen information to exploit clients.

F5’s BIG-IP platform handles load balancing and network security, routing digital traffic and shielding systems from intrusion.

US and UK governments issue emergency warnings

The US Cybersecurity and Infrastructure Security Agency (CISA) called the incident a “significant cyber threat targeting federal networks.” In an emergency directive issued on Wednesday, CISA ordered all federal agencies to identify and update their F5 products by October 22.

The UK’s National Cyber Security Centre also issued an alert about the breach on Wednesday, warning that hackers could use their access to F5 systems to exploit the company’s technology and to identify additional vulnerabilities.

Following the disclosure, F5 CEO Francois Locoh-Donou held briefings with customers to explain the scope of the breach. Francois confirmed that the company had called in CrowdStrike and Google’s Mandiant to assist alongside law enforcement and government investigators.

Officials familiar with the probe allegedly told Bloomberg that the Chinese government was behind the attack. But a Chinese spokesperson dismissed the accusation as “groundless and made without evidence.”

Ilia Rabinovich, Sygnia’s vice president of cybersecurity consulting, said that in the case Sygnia disclosed last year, hackers hid inside F5’s appliances and used them as a “command and control” base to infiltrate victim networks undetected. “There is a potential for it to evolve into something that is massive, because numerous organizations deploy those devices,” he said.

Claim your free seat in an exclusive crypto trading community – limited to 1,000 members.

Source: https://www.cryptopolitan.com/ccp-hackers-hid-inside-f5-networks-for-years/

Market Opportunity
null Logo
null Price(null)
--
----
USD
null (null) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

FTX Trust Sues Genesis Digital for $1.15B Clawback Over Alleged Fraudulent Transfers

FTX Trust Sues Genesis Digital for $1.15B Clawback Over Alleged Fraudulent Transfers

The FTX Recovery Trust has filed a $1.15 billion lawsuit against the Bitcoin mining firm Genesis Digital Assets, alleging fraudulent transfers. The complaint, filed on Monday in U.S. Bankruptcy Court for the District of Delaware, alleges that Sam Bankman-Fried used misappropriated FTX customer funds to purchase Genesis Digital shares at “outrageously inflated prices” through his hedge fund, Alameda Research, between August 2021 and April 2022. Genesis Digital co-founders Rashit Makhat and Marco Krohn received $470 million and $80.9 million, respectively, for their shares in February 2022, according to court documents. The trust contends that only Alameda, and by extension Bankman-Fried, as its 90% owner, benefited from the investments, while FTX customers and creditors suffered losses from the diverted exchange funds.Court Document (Source: Bloomberg Law) Genesis Investment Timeline Reveals Systematic Fund Diversion Court documents reveal that discussions between Bankman-Fried and Genesis Digital began in July 2021, when the Kazakhstan-based mining company was seeking capital to expand its operations into the United States. Bankman-Fried joined Genesis Digital’s board in October 2021, according to Bloomberg, positioning himself to oversee what would become one of Alameda’s largest venture investments. The complaint describes how the FTX founder caused Alameda to purchase multiple tranches of Genesis shares over an eight-month period, with the lawsuit characterizing Genesis as “one of Bankman-Fried’s most reckless investments with commingled and misappropriated funds.“ Between August 2021 and April 2022, Alameda invested $1.15 billion across four distinct funding rounds: $100 million in August 2021, $550 million in January 2022, $250 million in February, and $250 million in April 2022. The trust alleges that FTX insiders regularly caused Alameda to “borrow” billions from the FTX.com exchange to fund “profligate lifestyles and vanity investments” while hiding the source of these funds from investors and creditors. Bankman-Fried resigned from Genesis Digital’s board one day before FTX filed for bankruptcy in November 2022, according to the court filing. Mining Sector Faces Renewed Scrutiny Amid FTX Fallout The Genesis Digital lawsuit is the latest effort by FTX’s bankruptcy estate to recover assets for creditors, with the trust having already distributed $6.2 billion across two previous rounds of payments. The trust completed a $1.2 billion distribution in February, followed by a larger $5 billion payout in May, with an additional $1.6 billion distribution scheduled for September 30, bringing total recoveries to nearly half of the $16.5 billion earmarked for victims. These recovery efforts come as Genesis Digital, which operates over 500 megawatts of mining capacity across 20 data centers on four continents, saw its valuation reach $5.5 billion during an April 2022 fundraising round shortly before cryptocurrency prices collapsed later that year. The mining company was exploring an initial public offering in the United States as recently as July 2024, working with advisors to evaluate a potential listing and planning a pre-IPO funding round amid the crypto industry’s recovery from the 2022 market downturn. However, the FTX lawsuit adds another layer of complexity to Genesis Digital’s corporate structure, which includes an extensive network of U.S. subsidiaries with names like Dog House TX-1, Mother Whale LLC, and White Deer LLC. The complaint alleges that these U.S. subsidiaries operate as “alter egos” of the parent company, potentially exposing the entire corporate structure to clawback claims under both federal bankruptcy law and Delaware state fraudulent transfer statutes. Meanwhile, Bankman-Fried continues to serve his 25-year prison sentence following his conviction on seven felony charges, with oral arguments for his appeal scheduled for November 4, 2025. The lawsuit adds to the complex web of litigation following the $175 million settlement earlier this year with Genesis Global, a subsidiary of Digital Currency Group, as creditors and bankruptcy trustees pursue recovery efforts across multiple jurisdictions and corporate entities tied to the failed exchange
Share
CryptoNews2025/09/24 03:14
Ripple-Backed Evernorth Faces $220M Loss on XRP Holdings Amid Market Slump

Ripple-Backed Evernorth Faces $220M Loss on XRP Holdings Amid Market Slump

TLDR Evernorth invested $947M in XRP, now valued at $724M, a loss of over $220M. XRP’s price dropped 16% in the last 30 days, leading to Evernorth’s paper losses
Share
Coincentral2025/12/26 03:56
New Trump appointee Miran calls for half-point cut in only dissent as rest of Fed bands together

New Trump appointee Miran calls for half-point cut in only dissent as rest of Fed bands together

The post New Trump appointee Miran calls for half-point cut in only dissent as rest of Fed bands together appeared on BitcoinEthereumNews.com. Stephen Miran, chairman of the Council of Economic Advisers and US Federal Reserve governor nominee for US President Donald Trump, arrives for a Senate Banking, Housing, and Urban Affairs Committee confirmation hearing in Washington, DC, US, on Thursday, Sept. 4, 2025. The Senate Banking Committee’s examination of Stephen Miran’s appointment will provide the first extended look at how prominent Republican senators balance their long-standing support of an independent central bank against loyalty to their party leader. Photographer: Daniel Heuer/Bloomberg via Getty Images Daniel Heuer | Bloomberg | Getty Images Newly-confirmed Federal Reserve Governor Stephen Miran dissented from the central bank’s decision to lower the federal funds rate by a quarter percentage point on Wednesday, choosing instead to call for a half-point cut. Miran, who was confirmed by the Senate to the Fed Board of Governors on Monday, was the sole dissenter in the Federal Open Market Committee’s statement. Governors Michelle Bowman and Christopher Waller, who had dissented at the Fed’s prior meeting in favor of a quarter-point move, were aligned with Fed Chair Jerome Powell and the others besides Miran this time. Miran was selected by Trump back in August to fill the seat that was vacated by former Governor Adriana Kugler after she suddenly announced her resignation without stating a reason for doing so. He has said that he will take an unpaid leave of absence as chair of the White House’s Council of Economic Advisors rather than fully resign from the position. Miran’s place on the board, which will last until Jan. 31, 2026 when Kugler’s term was due to end, has been viewed by critics as a threat from Trump to the Fed’s independence, as the president has nominated three of the seven members. Trump also said in August that he had fired Federal Reserve Board Governor…
Share
BitcoinEthereumNews2025/09/18 02:26