citizenpaul 21 minutes ago

>F5 disclosed that nation-state hackers

Something about this statement screams that companies are setting themselves up for free money from big old gov'ment welfare titties. I keep seeing it pop up again and again and it only makes sense in that context.

Its the boogyman like terrorism. We need infinite money to fight the bad guys.

fn-mote an hour ago

I am having a hard time believing that an attacker maintained long term access to their system and never used it.

It seems more likely that we do not KNOW how the access was used.

  • bangaladore 41 minutes ago

    They say the attacker exfiltrated data, including source code.

    They claim the vulnerabilities discovered through the exfiltration were not used though.

    • bangaladore 29 minutes ago

      Not sure why I'm downvoted. Literally quoted from their incident page.

      > We have confirmed that the threat actor exfiltrated files from our BIG-IP product development environment and engineering knowledge management platforms. These files contained some of our BIG-IP source code and information about undisclosed vulnerabilities we were working on in BIG-IP.

      > We have no knowledge of undisclosed critical or remote code vulnerabilities, and we are not aware of active exploitation of any undisclosed F5 vulnerabilities.

      https://my.f5.com/manage/s/article/K000154696

ZeroConcerns an hour ago

I'm not sure if item #2 in the linked advisory ("identify if the networked management interface is accessible directly from the public internet") indicates whether compromise is only likely in that situation or not, but... lots of remote workers are going to have some time for offline reflection in the next week, it seems regardless.

ktallett 8 minutes ago

I'm slightly questioning the security of a cybersecurity company that has systems that allow people long term access.

sevg 2 hours ago

I wonder if they’re just saying “nation-state” to make it seem less bad that they were compromised, without having proof that it was an actual nation state. (I mean it could well be a nation state, but just a thought.)

  • joshred 9 minutes ago

    BRB, changing handle to 'nation-state'. Need the resume fodder.

  • scotho3 an hour ago

    BIG-IP runs DPI (not as good as Sandvine Active Logic), but it's an authoritarian states best friend. Want to compromise another nation state that runs all their traffic through it? These vulns aren't a bad place to start...

    • vel0city an hour ago

      This is why I don't understand this strong desire for security auditors to have centralized TLS decryption be important to having some high security stance. You're just creating a massive single point of failure and potentially massively weakening encryption.

  • zamadatix an hour ago

    Even if it was actually an honest to god nation-state I can't see why security circles get hyperfixated on the term. Does it really matter at all if it's a nation, state, or nation-state? Of course not, but "nation-state" sounds really cool so that's the go to, even when it's not actually a nation-state.

    • ecshafer 21 minutes ago

      Because "We got hacked by the concerted efforts of China/Russia" sounds much better than "We literally never update php or linux, and John Script Kiddy Jones pwnd us".

    • kakacik an hour ago

      Lowers the percieved incompetence on hacked side, and its hard to argue against (how do you prove it wasnt?). Stock price fall distaster mitigation via simple PR.

      But I agree experts should know better when of any solid proof is lacking. Or any proof at all.

      • zamadatix 2 minutes ago

        What I'm saying is they often actually mean "country", but that is less fancy sounding. A nation-state is just one specific type of polity, certainly not the only type which organize attacks.

  • resfirestar an hour ago

    Often it can be like that. This a case where the kind of attacker seems highly relevant, though. Imagine a group like Shiny Hunters were the ones to steal these vulns from F5, you'd know if they hit your F5s because they'd have already dumped all your databases and bragged about it. The attacker being a "nation-state" warrants a more careful investigation of historical activity if you're the kind of organization that gets targeted by espionage motivated attacks.

  • verdverm 2 hours ago

    This def seems like corpo disaster PR copy. Not the kind of content I expected and love HN for

ChrisArchitect 2 hours ago
  • zingababba 11 minutes ago

    The NCC attestation letter is wild:

    F5, Inc. (“F5”) engaged NCC Group to perform (i) a security assessment of critical F5 software source code, including critical software components of the BIG-IP product, as provided by F5, and (ii) a review of portions of the software development build pipeline related to the same, and designated as critical by F5 (collectively, the “In-Scope Items”). NCC Group’s assessment included a source code security review by 76 consultants over a total of 551 person-days of effort.

    Wonder what the bill was?

  • wobfan an hour ago

    > highly sophisticated nation-state threat actor

    Sure thing. It's so hard not to hate this PR stuff when they can't even be a tiny bit humble. "The hackers were so sophisticated and organized, we didn't even have a change! They could've hacked everyone!"

    > In response to this incident, we are taking proactive measures to protect our customers

    Such as, fixing the bugs or the structural problems that led to you being hacked and leaking information about even more bugs that you left undisclosed and just postponed to fix it? This wording sounds like they're now going the extra mile to protect their customers and makes it sound like a good thing, when keeping your systems secure and fixing known bugs should've been the first meters they should've gone.

    Just be honest, you fucked up twice. It's shit, but it happens. I just hate PR.

    • reactordev 36 minutes ago

      Especially considering who they are, Agreed. There's not an ounce of empathy I have for them. They are a backbone of the internet and should know better.

bananapub an hour ago

oh that's handy, they can add them to the big pile of disclosed BIG-IP flaws

tru3_power 2 hours ago

“No one will ever find these vulns without source access! Fix deferred” oh wait…

  • bangaladore an hour ago

    Yeah, I was trying to make sense of what was described here.

    Is it that (through some mechanism) an actor gained access to F5's sytems, and literally found undisclosed vulnerabilities documented within F5's source control / documentation that affects F5's products?

    If so, lol.