HomeCyber BalkansHackers Exploit F5 BIG-IP for SSH Access and Lateral Movement into Linux...

Hackers Exploit F5 BIG-IP for SSH Access and Lateral Movement into Linux Networks

Published on

spot_img

Cybersecurity Concerns Rise as Threat Actors Exploit F5 BIG-IP Appliances

Recent reports reveal a significant cybersecurity threat as malicious actors are increasingly targeting outdated F5 BIG-IP appliances to infiltrate enterprise networks. This alarming trend involves leveraging compromised devices to initiate sophisticated multi-stage intrusion campaigns with the ultimate aim of breaching Active Directory infrastructures. Microsoft Threat Intelligence has outlined the intricacies of this attack vector, shedding light on a coordinated effort that underscores a broader vulnerability landscape.

On May 22, 2026, Microsoft disclosed a detailed account of a specific incident, illustrating how a single compromised F5 BIG-IP appliance acted as the entry point for a larger domain-level breach. This breach spanned various systems, including Linux hosts, an internal Atlassian Confluence server, and essential Windows authentication platforms. Investigators traced the origin of the breach back to an Azure-hosted F5 BIG-IP Virtual Edition (VE) running an outdated version—15.1.201000. This particular version had reached its end-of-life (EOL) status on December 31, 2024, meaning that it was neither patched nor supported at the time of the attack.

This situation underscores a significant concern within the cybersecurity landscape. The timing of the attack aligns ominously with a broader convergence of vulnerabilities related to the F5 ecosystem. Notably, a major security breach in August 2025 saw a nation-state actor penetrate F5’s internal systems, pilfering sensitive source code for the BIG-IP product line along with details of unpatched vulnerabilities. This breach, which was made public in October of the same year, was linked to the BRICKSTORM malware family, known for targeting software and cloud vendors to obtain source code and credentials for further exploitation within supply chains.

Compounding this precarious situation is a critical flaw designated as CVE-2025-53521, originally identified in October 2025 as a denial-of-service vulnerability. By March 2026, this flaw had been recategorized as a remote code execution (RCE) vulnerability with a high CVSS score of 9.8. The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-53521 to its Known Exploited Vulnerabilities (KEV) catalog shortly thereafter. Reports from the Shadowserver Foundation indicated that over 17,000 IP addresses globally were susceptible to exploitation via this vulnerability. Even more concerning, the Dutch National Cyber Security Center corroborated reports of active exploitation occurring in the wild.

Once the threat actor gained SSH access through the compromised F5 appliance, they were able to authenticate using a privileged account equipped with unrestricted sudo rights. This access granted continuous control throughout the entire intrusion process, allowing the attacker to bypass traditional persistence mechanisms.

The initial phase of the attack involved extensive reconnaissance, leveraging a multi-layered toolkit that included:

  1. Nmap: Automated scripts for comprehensive horizontal and vertical network scanning across internal networks.
  2. GoWitness: A tool for capturing screenshots of all discovered HTTP and HTTPS services.
  3. testssl: Used to probe SSL/TLS vulnerabilities and identify potential protocol downgrade paths.
  4. A custom ELF binary recognized as HackTool:Linux/MalPack.B, which was downloaded to enumerate web application access controls.

While the attackers made several attempts to utilize standard NTLM-based lateral movement tools—such as enum4linux, kerbrute, responder, smbclient, and netexec—against the Windows infrastructure, these initial efforts were largely unsuccessful. In the course of their reconnaissance, however, the attackers discovered an Atlassian Confluence server that contained unaddressed remote code execution vulnerabilities. Crucially, this server was not exposed to the internet; it became accessible only after the threat actor secured internal network access. This situation exemplifies the risks associated with hybrid and cloud environments, where implicit trust boundaries exist between interconnected services.

When the server’s real-time protection mechanisms prevented direct payload delivery, the attacker pivoted by setting up a Python FTP server on the compromised Linux host, facilitating the staging and transfer of malicious payloads.

After breaching Confluence, they extracted critical credentials from configuration files, including server.xml and confluence.cfg.xml, which were then weaponized to conduct Kerberos relay attacks on the domain infrastructure. The exploitation of CVE-2025-33073—a Windows SMB NTLM reflection vulnerability—enabled the attacker to facilitate authenticated remote code execution on any domain-joined machine, further escalating the threat.

This series of events not only illuminates the complexities of modern cybersecurity threats but also serves as a cautionary tale for organizations utilizing legacy systems. Immediate actions for mitigation are crucial:

  • Retiring EOL appliances and treating them as high-value assets needing strict lifecycle governance.
  • Patching internal applications like Confluence as vigorously as those exposed to the internet.
  • Minimizing NTLM usage and enforcing SMB signing while enabling LDAP signing and channel binding to thwart relay attacks.
  • Implementing robust endpoint protection measures consistently across all Linux servers.

Enterprises must remain vigilant in their cybersecurity practices, especially as the landscape continues to evolve and threats become more sophisticated. Addressing these vulnerabilities effectively could safeguard sensitive infrastructures and minimize the potential for widespread exploitation.

Source link

Latest articles

GraphWorm Malware Utilizes OneDrive for Command and Control

New Threat Emerges: Webworm Utilizes Microsoft's OneDrive for Malicious Activities A rapidly evolving cyber threat...

TAX#TRIDENT Campaign Distributes Windows Malware

Beware of a New Malware Campaign Targeting Windows Users: TAX#TRIDENT A concerning new malware campaign...

Hackers Exploit SEO Poisoning to Create Fake Gemini CLI and Claude Installers

Financial Threat Actors Target AI Developers with Sophisticated Infostealer Campaign In a concerning turn of...

Zscaler Aims to Mitigate AI Identity Risk Through Symmetry Acquisition

Startup Symmetry Systems Maps Relationships Across AI, SaaS, and Cloud Assets Zscaler, a prominent player...

More like this

GraphWorm Malware Utilizes OneDrive for Command and Control

New Threat Emerges: Webworm Utilizes Microsoft's OneDrive for Malicious Activities A rapidly evolving cyber threat...

TAX#TRIDENT Campaign Distributes Windows Malware

Beware of a New Malware Campaign Targeting Windows Users: TAX#TRIDENT A concerning new malware campaign...

Hackers Exploit SEO Poisoning to Create Fake Gemini CLI and Claude Installers

Financial Threat Actors Target AI Developers with Sophisticated Infostealer Campaign In a concerning turn of...