The post Chinese-linked hackers infiltrated F5’s systems in late 2023 appeared on BitcoinEthereumNews.com. Hackers linked to China’s state-backed cyber units infiltrated F5’s internal networks in late 2023 and stayed hidden until this August, according to Bloomberg. The Seattle-based cybersecurity company admitted in filings that its systems had been compromised for nearly two years, allowing attackers “long-term, persistent access” to its internal infrastructure. The breach reportedly exposed source code, sensitive configuration data, and information about undisclosed software vulnerabilities in its BIG-IP platform, a technology that powers the networks of 85% of Fortune 500 companies and many US federal agencies. The hackers broke in through F5’s own software, which had been left exposed online after employees failed to follow internal security policies. The attackers exploited that weak point to enter and roam freely inside systems that should have been locked down. F5 company told customers that the oversight directly violated the same cyber guidelines the company teaches its clients to follow. When the news broke, F5’s shares fell more than 10% on October 16, wiping out millions in market value. “Since that vulnerability information is out there, everyone using F5 should assume they’re compromised,” said Chris Woods, a former security executive with HP who is now founder of CyberQ Group Ltd., a cybersecurity services firm in the UK. Hackers used F5’s own technology to maintain stealth and control F5 sent customers on Wednesday a threat hunting guide for a type of malware called Brickstorm used by Chinese state-backed hackers, according to Bloomberg. Mandiant, which was hired by F5, confirmed that Brickstorm allowed hackers to move quietly through VMware virtual machines and deeper infrastructure. After securing their foothold, the intruders stayed inactive for over a year, an old but effective tactic meant to outwait the company’s security log retention period. Logs, which record every digital trace, are often deleted after 12 months to save costs. Once… The post Chinese-linked hackers infiltrated F5’s systems in late 2023 appeared on BitcoinEthereumNews.com. Hackers linked to China’s state-backed cyber units infiltrated F5’s internal networks in late 2023 and stayed hidden until this August, according to Bloomberg. The Seattle-based cybersecurity company admitted in filings that its systems had been compromised for nearly two years, allowing attackers “long-term, persistent access” to its internal infrastructure. The breach reportedly exposed source code, sensitive configuration data, and information about undisclosed software vulnerabilities in its BIG-IP platform, a technology that powers the networks of 85% of Fortune 500 companies and many US federal agencies. The hackers broke in through F5’s own software, which had been left exposed online after employees failed to follow internal security policies. The attackers exploited that weak point to enter and roam freely inside systems that should have been locked down. F5 company told customers that the oversight directly violated the same cyber guidelines the company teaches its clients to follow. When the news broke, F5’s shares fell more than 10% on October 16, wiping out millions in market value. “Since that vulnerability information is out there, everyone using F5 should assume they’re compromised,” said Chris Woods, a former security executive with HP who is now founder of CyberQ Group Ltd., a cybersecurity services firm in the UK. Hackers used F5’s own technology to maintain stealth and control F5 sent customers on Wednesday a threat hunting guide for a type of malware called Brickstorm used by Chinese state-backed hackers, according to Bloomberg. Mandiant, which was hired by F5, confirmed that Brickstorm allowed hackers to move quietly through VMware virtual machines and deeper infrastructure. After securing their foothold, the intruders stayed inactive for over a year, an old but effective tactic meant to outwait the company’s security log retention period. Logs, which record every digital trace, are often deleted after 12 months to save costs. Once…

Chinese-linked hackers infiltrated F5’s systems in late 2023

2025/10/19 11:07

Hackers linked to China’s state-backed cyber units infiltrated F5’s internal networks in late 2023 and stayed hidden until this August, according to Bloomberg. The Seattle-based cybersecurity company admitted in filings that its systems had been compromised for nearly two years, allowing attackers “long-term, persistent access” to its internal infrastructure.

The breach reportedly exposed source code, sensitive configuration data, and information about undisclosed software vulnerabilities in its BIG-IP platform, a technology that powers the networks of 85% of Fortune 500 companies and many US federal agencies.

The hackers broke in through F5’s own software, which had been left exposed online after employees failed to follow internal security policies. The attackers exploited that weak point to enter and roam freely inside systems that should have been locked down.

F5 company told customers that the oversight directly violated the same cyber guidelines the company teaches its clients to follow. When the news broke, F5’s shares fell more than 10% on October 16, wiping out millions in market value.

“Since that vulnerability information is out there, everyone using F5 should assume they’re compromised,” said Chris Woods, a former security executive with HP who is now founder of CyberQ Group Ltd., a cybersecurity services firm in the UK.

Hackers used F5’s own technology to maintain stealth and control

F5 sent customers on Wednesday a threat hunting guide for a type of malware called Brickstorm used by Chinese state-backed hackers, according to Bloomberg.

Mandiant, which was hired by F5, confirmed that Brickstorm allowed hackers to move quietly through VMware virtual machines and deeper infrastructure. After securing their foothold, the intruders stayed inactive for over a year, an old but effective tactic meant to outwait the company’s security log retention period.

Logs, which record every digital trace, are often deleted after 12 months to save costs. Once those logs were gone, the hackers reactivated and pulled data from BIG-IP, including source code and vulnerability reports.

F5 said that while some customer data was accessed, it has no real evidence that hackers changed its source code or used the stolen information to exploit clients.

F5’s BIG-IP platform handles load balancing and network security, routing digital traffic and shielding systems from intrusion.

US and UK governments issue emergency warnings

The US Cybersecurity and Infrastructure Security Agency (CISA) called the incident a “significant cyber threat targeting federal networks.” In an emergency directive issued on Wednesday, CISA ordered all federal agencies to identify and update their F5 products by October 22.

The UK’s National Cyber Security Centre also issued an alert about the breach on Wednesday, warning that hackers could use their access to F5 systems to exploit the company’s technology and to identify additional vulnerabilities.

Following the disclosure, F5 CEO Francois Locoh-Donou held briefings with customers to explain the scope of the breach. Francois confirmed that the company had called in CrowdStrike and Google’s Mandiant to assist alongside law enforcement and government investigators.

Officials familiar with the probe allegedly told Bloomberg that the Chinese government was behind the attack. But a Chinese spokesperson dismissed the accusation as “groundless and made without evidence.”

Ilia Rabinovich, Sygnia’s vice president of cybersecurity consulting, said that in the case Sygnia disclosed last year, hackers hid inside F5’s appliances and used them as a “command and control” base to infiltrate victim networks undetected. “There is a potential for it to evolve into something that is massive, because numerous organizations deploy those devices,” he said.

Claim your free seat in an exclusive crypto trading community – limited to 1,000 members.

Source: https://www.cryptopolitan.com/ccp-hackers-hid-inside-f5-networks-for-years/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Grayscale debuts first US spot crypto ETPs with staking

Grayscale debuts first US spot crypto ETPs with staking

The post Grayscale debuts first US spot crypto ETPs with staking appeared on BitcoinEthereumNews.com. Grayscale Investments has just launched the first US-listed spot crypto exchange-traded products (ETPs) offering staking. The Grayscale Ethereum Trust ETF (ETHE) and Grayscale Ethereum Mini Trust ETF (ETH) now enable Ether staking, while the Grayscale Solana Trust (GSOL) has activated staking capabilities ahead of its proposed uplisting as a spot Solana ETP. The move provides traditional brokerage investors with access to staking rewards — previously confined to native crypto platforms — through regulated vehicles. The products are not registered under the Investment Company Act of 1940, meaning they operate outside the framework governing traditional mutual funds and ETFs. Staking, the process of locking up tokens to secure proof-of-stake blockchains like Ethereum and Solana in exchange for rewards, introduces yield potential but also adds operational and network risks.  Grayscale said staking will be managed through institutional custodians and diversified validator networks to reduce single-party risk. This marks the first time US investors can access staking yield through exchange-traded exposure to Ethereum and Solana, expanding upon regulatory acceptance that began with spot Bitcoin ETFs in January 2024 and spot Ether ETFs in July 2024.  Grayscale CEO Peter Mintzberg called the initiative “first mover innovation,” underscoring the firm’s role in shaping institutional crypto access. This is a developing story. This article was generated with the assistance of AI and reviewed by editor Jeffrey Albus before publication. Get the news in your inbox. Explore Blockworks newsletters: Source: https://blockworks.co/news/grayscale-us-spot-crypto-etps-staking
Share
BitcoinEthereumNews2025/10/06 21:29
Spot XRP ETFs Nears $1B AUM Milestone as Streak of No Outflows Continues

Spot XRP ETFs Nears $1B AUM Milestone as Streak of No Outflows Continues

The post Spot XRP ETFs Nears $1B AUM Milestone as Streak of No Outflows Continues appeared on BitcoinEthereumNews.com. The U.S. Spot XRP ETFs is now near the $1 billion mark of assets under management in less than a month since their launch. This follows from the product maintaining consistent inflows with no single outflow recorded yet. XRP ETFs See Continuous Inflows Since Launch Since its first launch on November 14, spot XRP funds have seen continued inflows. According to data from SoSoValue, the total inflows into these funds have now risen to $881.25 million. The funds attracted $12.84 million of new money yesterday. The daily trading volumes remained stable at $26.74 million. Source: SoSoValue Reaching nearly $1 billion in less than 30 days makes the product among the fastest growing crypto investment products in the United States. Notably, Spot Solana ETFs also accumulated over $600 million since their launch. On the other hand, Bitcoin and Ethereum ETFs are holding about $58 billion and about $13 billion in assets under management respectively. Much of the early growth traces back to the first Canary Capital’s XRP ETF. Its opening on November 13 brought one of the strongest crypto ETF openings to date. It saw more than $59 million in first-day trading volume and $245 million in net inflows. Shortly after Canary’s launch, firms like Grayscale, Bitwise, and Franklin Templeton introduced their own XRP products. Bitwise’s fund also did well on its launch, recording over $105 million in early inflows. Meanwhile, the market is getting ready for yet another addition. 21Shares’ U.S. spot XRP fund also got the green light from the SEC. It will trade under the ticker TOXR on the Cboe BZX Exchange. XRP Products Keep Gaining Momentum in the Market The token’s funds continued to expand this week. REX Shares and Tuttle Capital have launched the T-REX 2X Long XRP Daily Target ETF. This new ETF allows traders…
Share
BitcoinEthereumNews2025/12/05 14:11
Headwind Helps Best Wallet Token

Headwind Helps Best Wallet Token

The post Headwind Helps Best Wallet Token appeared on BitcoinEthereumNews.com. Google has announced the launch of a new open-source protocol called Agent Payments Protocol (AP2) in partnership with Coinbase, the Ethereum Foundation, and 60 other organizations. This allows AI agents to make payments on behalf of users using various methods such as real-time bank transfers, credit and debit cards, and, most importantly, stablecoins. Let’s explore in detail what this could mean for the broader cryptocurrency markets, and also highlight a presale crypto (Best Wallet Token) that could explode as a result of this development. Google’s Push for Stablecoins Agent Payments Protocol (AP2) uses digital contracts known as ‘Intent Mandates’ and ‘Verifiable Credentials’ to ensure that AI agents undertake only those payments authorized by the user. Mandates, by the way, are cryptographically signed, tamper-proof digital contracts that act as verifiable proof of a user’s instruction. For example, let’s say you instruct an AI agent to never spend more than $200 in a single transaction. This instruction is written into an Intent Mandate, which serves as a digital contract. Now, whenever the AI agent tries to make a payment, it must present this mandate as proof of authorization, which will then be verified via the AP2 protocol. Alongside this, Google has also launched the A2A x402 extension to accelerate support for the Web3 ecosystem. This production-ready solution enables agent-based crypto payments and will help reshape the growth of cryptocurrency integration within the AP2 protocol. Google’s inclusion of stablecoins in AP2 is a massive vote of confidence in dollar-pegged cryptocurrencies and a huge step toward making them a mainstream payment option. This widens stablecoin usage beyond trading and speculation, positioning them at the center of the consumption economy. The recent enactment of the GENIUS Act in the U.S. gives stablecoins more structure and legal support. Imagine paying for things like data crawls, per-task…
Share
BitcoinEthereumNews2025/09/18 01:27