Cybersecurity firm F5 Networks says government-backed hackers had “long-term, persistent access” to its network, which allowed them to steal the company’s source code and customer information. In a filing with the U.S. Securities and Exchange Commission on Wednesday,
F5 said it now “believes its containment actions have been successful,” after first discovering the hackers in its network on August 9. The Seattle, Washington-based company, which specializes in providing application security and cybersecurity defenses for large companies and governments, said the hackers had access to its BIG-IP product development environment and its knowledge management systems, which included source code and publicly undisclosed security vulnerabilities.
Read more…
Source: TechCrunch News
Sign up for the Cyber Security Review Newsletter
The latest cyber security news and insights delivered right to your inbox
Related:
- 20 Arrests In QQAAZZ Multi-Million Money Laundering Case
October 15, 2020
An unprecedented international law enforcement operation involving 16 countries has resulted in the arrest of 20 individuals suspected of belonging to the QQAAZZ criminal network which attempted to launder tens of millions of euros on behalf of the world’s foremost cybercriminals. Some 40 house searches were carried out in Latvia, Bulgaria, the United Kingdom, Spain and ...
- FIN11 Cybercrime Gang Shifts Tactics to Double-Extortion Ransomware
October 14, 2020
The FIN11 financial crime gang is shifting its tactics from phishing and credential-theft to ransomware, researchers said. According to FireEye Mandiant researchers, FIN11 is notable for its “sheer volume of activity,” known to run up to five disparate wide-scale email phishing campaigns per week. “At this point, it would be difficult to name a client that ...
- Software AG Data Released After Clop Ransomware Strike – Report
October 13, 2020
Clop and the group’s signature malware has struck again — this time hitting a giant target in the form of German software conglomerate Software AG. The company isn’t paying a mammoth $23 million ransom (so far), and over the weekend it confirmed that the crooks were releasing company data, according to reports. The Clop ransomware cybercriminals ...
- Cybercriminals Gamble With Victims’ Livelihoods To Pass the Covid-19 Blues
October 12, 2020
In the Trend Micro 2020 midyear security report, we discussed how the Covid-19 global pandemic affected the cybersecurity industry. However, the pandemic didn’t just change the way businesses (and subsequently, their employees) operate; the nature of certain criminal activities have also changed in this time of isolation. Interestingly, some of this involves what we might call ...
- Court orders seizure of ransomware botnet controls as U.S. election nears
October 12, 2020
Microsoft said Monday it had used a court order to take control of computers that were installing ransomware and other malicious software on local government networks and threatening to disrupt the November election. The maker of the Windows operating system said it seized a series of internet protocol addresses hosted by U.S. companies that had been ...
- The most common malicious email attachments infecting Windows
October 11, 2020
To stay safe online, everyone needs to recognize malicious attachments that are commonly used in phishing emails to distribute malware. When distributing malware, threat actors create spam campaigns that pretend to be invoices, invites, payment information, shipping information, eFaxes, voicemails, and more. Included in these emails are malicious Word and Excel attachments, or links to them, ...
