Attackers exploiting unpatched F5 BIG-IP devices

By
Follow google news

Crypto miners and webshells dropped.

A critical vulnerability in F5 data centre and enterprise network products that was revealed on July 1 this year is being actively exploited remotely, security researchers have observed.

Attackers exploiting unpatched F5 BIG-IP devices

Security vendor NCCGroup's Research and Intelligence Fusion Team (RIFT) has monitored the exploits since July 3 when it saw the first attacks, 

Threat actors are dropping Monero crypto-currency miner malware, webshells that can be used as remote attack platforms, and other more complex payloads.

If administrators were slow to patch, it is likely that their devices have already been hacked.

A patch against the vulnerability is available but NCCGroup advised that F5 customers that patched after July 4 US time should "assume compromise and conduct a forensic examination of the server."

The same goes for sites that applied mitigations after July 4 US time; these should check for signs of exploitation before log files are rotated and the data in them is overwritten.

The flaw lies in the Traffic Management User Interface configuration utility which does not properly implement access controls.

Just days after security vendor Positive Technologies discovered the flaw, a simple, one-line exploit for it was made public and did the rounds on social media.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

AI can unmask online users for just a few dollars each

AI can unmask online users for just a few dollars each

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Health and Aged Care CISO retires

Health and Aged Care CISO retires

Phishers abuse little-known core Internet infrastructure

Phishers abuse little-known core Internet infrastructure

Log In

  |  Forgot your password?