
"F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a "sophisticated" threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a "long-term." Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network for years."
"During that time, F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world's top 50 corporations. Wednesday's disclosure went on to say the threat group downloaded proprietary BIG-IP source code information about vulnerabilities that had been privately discovered but not yet patched. The hackers also obtained configuration settings some customers used inside their networks."
A sophisticated nation-state threat group gained long-term, persistent access to F5's network and controlled the segment used to build and distribute BIG-IP updates. The attackers downloaded proprietary BIG-IP source code, documentation of unpatched vulnerabilities, and some customer configuration settings. Control of the build system and access to source code and configurations enables supply-chain exploitation and unprecedented knowledge of weaknesses across thousands of networks, many of them sensitive. Stolen customer configurations increase the risk of credential abuse. BIG-IP devices sit at network edges as load balancers, firewalls, and for encryption and inspection, amplifying potential impact if exploited.
Read at Ars Technica
Unable to calculate read time
Collection
[
|
...
]