Connect with us

Tech News

Hackers Spotted: Attempts To Steal Important Passwords From F5 BIG IP-Devices

Published

on

Hackers have started to launch attacks on F5 BIG-IP networking devices. This comes as no surprise, especially since there has been a significant increase in both phishing scams and spam spikes during the COVID-19 period as hackers attempt to prey on stressed-out IT systems. 

The attacks launched against these devices are reported to be malicious, with these hackers trying to steal important passwords from the devices. After investigation, it was concluded that these attacks were aimed at BIG-IP – a multi-purpose networking device that is manufactured by F5 networks.

Not only are these devices malleable and can be configured as various purposes from firewalls to SSL middleware, and access gateways, they’re also one of the most popular networking products used, and helps to support some of the world’s largest and sensitive networks – most likely why these devices were targeted. 

Some networks that it supports include cloud computing data centers and even government networks. These devices are apparently so popular and powerful that 90% of the companies listed on the Fortune 50 list rely on their systems. 

What happened? 

Apparently, it was reported by F5 networks that there was a vulnerability within the BIG-IP devices. Tracked as CVE-2020-5902, it would apparently allow hackers to take full control over any unpatched systems that could be accessed over the internet. 

The vulnerability was so severe that it was slapped with a severity score of 10 – a maximum on the severity scale. This score indicates that the vulnerability was easy to exploit, and doesn’t require extensive coding skills or valid credentials. 

With an increase in hacking attacks and phishing happening all over the world, it would only be a matter of time before hackers would figure out how to exploit this particular vulnerability. Even though various parties such as the US Cyber Command tried to warn system administrators to patch the BIG-IP devices, the attacks had already started.

What did the hackers try to do? 

The attacks were malicious and the hackers tried to invoke.JSP files using a traversal sequence which allows them to read files and execute code. In turn, they were hoping to read various files and dump out the encrypted admin passwords, settings, and more. 

Has this happened before? 

The BIG-IP vulnerability is the type of security bug that hackers have been exploiting in other products for almost a year. Similar RCE bugs have been found in Citrix networking gateways, and hackers have been trying to gain entry into corporate networks, steal sensitive files, and even install ransomware.   

A lot of these bugs have been crucial for ransomware gangs, and in many cases, they don’t even exploit the bugs immediately. Instead, they plant it backdoors and then come back after weeks or even months to monetize their access. 

Some examples of ransomware gangs include Maze or Netwalker and they’ve been known to rely heavily on such bugs to attack some of the world’s largest security. 

Take steps to secure your data

In this case, there’s a need for organizations or companies to move towards securing their organizational data. There’s a need to be prepared for these sustained attacks and threats, as they’re only going to continue. 

If your system admins are too stretched to respond to everything or you don’t have the budget for an entire security team then maybe it’s time to invest in a managed service provider that’ll help you with remaining vigilant against ongoing threats.

Advertisement
Advertisement Submit
Finance7 days ago

The Resale Math Behind Choosing Herman Miller Furniture Over Fast Furniture

Press Release1 week ago

Arxia, The Next Major Layer 1, Records First Blockchain Transaction Over LoRa Radio Without Internet, Cellular, or Satellite

Press Release3 weeks ago

Truoux Upgrades High-Performance Matching Engine to Ensure Trading Resilience During Extreme Market Conditions

Press Release3 weeks ago

Truoux Obtains US SEC License, Advancing Crypto Financial Compliance

Press Release3 weeks ago

Truoux Obtains US MSB License, Building an International Compliance Framework

Press Release3 weeks ago

ElmonX Brings Baseball’s Holy Grail to the Blockchain with Reimagined T206 Honus Wagner Digital and Physical Drop

Press Release4 weeks ago

USDX Aims to Redefine Stablecoins with Yield, Utility, and Real-World Demand

Holidays1 month ago

What Is the Largest Legal Firework You Can Buy?

Narcotics Powerhouse
Legal News1 month ago

Global Narcotics Powerhouse: Inside the Kinahan “Super Cartel”

Press Release1 month ago

Duel Kasino Arvostelu & Bonuskoodi COM – Informative Guide to Duel.com for Finnish Players

Martin Family Mystery
Historical Events2 months ago

The 60-Year Secret: Solving the Martin Family Mystery

Press Release2 months ago

Nearly $400 Million Worth of Art. One Collection. One Day.

Victim Restitution
Legal News2 months ago

Victim Restitution in DoJ Crypto Cases: How Asset Recovery Is Pursued and Disbursed

Home Addition
Real Estate2 months ago

How Long Does It Take to Build a Home Addition

Dumpster Rentals
Environment2 months ago

Do Dumpster Rentals in Springfield, MO Include Delivery and Pickup

Advertisement
Advertisement

Trending News