back to article 'Highly sophisticated' government goons hacked F5, stole source code and undisclosed bug details

Security shop F5 today said "highly sophisticated nation-state" hackers broke into its network and stole BIG-IP source code, undisclosed vulnerability details, and customer configuration data belonging to a "small percentage" of its users. "The Company is currently reviewing the contents of these files and will communicate …

  1. VoiceOfTruth Silver badge

    Buzzword bingo

    Let's play buzzword bingo: nation-state, highly-sophisticated, broke-in, stole, small-percentage, discovered, China, Russia, long-term-access, critical, sensitive, threat, actor ...

    It goes on an on. All the usual words. All the usual platitudes. But once again it is a company which announces itself as providing "security solutions" that can't keep its own doors closed.

    Here's a new one: undisclosed vulnerability details. So, sitting on vulnerabilities rather than closing them urgently?

    But being allowed to say nothing about it since early August? That's a big EFF YOU to their customers.

    As I mentioned previously, average Joe has no chance. Imagine being told "use F5". OK, now we're secure as the leaky F5 bucket.

    1. Roland6 Silver badge

      Re: Buzzword bingo

      Shouldn’t forget Israel also has form, the question is whether US agencies were in the know…

      1. Claptrap314 Silver badge

        Re: Buzzword bingo

        Oh, yes. The Jews. But not the Norks or the Iranians. Go back to painting.

    2. Anonymous Coward
      Anonymous Coward

      Re: Buzzword bingo

      VoiceOfTruth is a Kremlin propaganda account. That much is obvious. Click on all articles posted in the last 48 hours and VoiceOfTruth posts the Kremlin propaganda line of the day and week across them all, day after day, month after month, year after year.

      @El Reg - are you planning to ever investigate the account or to the needful and bock the IP range, track the users past VPN endpoints or ToR exit nodes they're clearly using? Or you don't care as long as you get the interaction. It's pathetic. It's been going on for years now and it's tiring.

      1. MiguelC Silver badge

        Re: Buzzword bingo

        Why censor? We can all see what it is, and it helps us understand what are the propaganda claims du jour

        1. stiine Silver badge
          Devil

          Re: Buzzword bingo

          You forgot to add ', and most of the time they're fucking hilarious.'

    3. Sandtitz Silver badge

      Re: Buzzword bingo

      It goes on an on. All the usual words. All the usual platitudes. But once again it is an account which announces itself as providing "Voice of Truth" that can't keep its own lies in order.

      Al Capone was just a famous tax evader, right?

    4. ecofeco Silver badge

      Re: Buzzword bingo

      I don't get the downvotes. Have my upvotes.

      Far too many "security" companies getting hacked these days. Worthless paper tigers, one and all.

    5. Sloth77

      Re: Buzzword bingo

      I guess “highly sophisticated nation state” sounds better than “14 year old script kiddie” :-)

      1. Anonymous Coward
        Anonymous Coward

        Re: Buzzword bingo

        You beat me to it.

        The moment I read the phrase 'highly sophisticated' in connection with a hack I just know it must have been something like using 'password123' for admin level accounts..

    6. m4r35n357 Silver badge

      Re: Buzzword bingo

      Closed source rocks!

    7. MonkeyJuice Silver badge

      Re: Buzzword bingo

      Here's a new one: undisclosed vulnerability details. So, sitting on vulnerabilities rather than closing them urgently?

      That sounds like standard responsible disclosure- holding the vulnerabilities from publication until the vendors have had a chance to patch it. The security industry has been doing this because back in the bad old days they'd release the PoC and it would get weaponized by script kiddies.

      The other issue is that security is very, very hard to get right. You are running a machine with who knows how many millions of lines of code, and all it takes is for one of those to be wrong. Defence is far harder than offence- you need to stop every single attack, including ones you may not yet be aware of, the attacker just needs to have one payload land correctly.

      1. Anonymous Coward
        Anonymous Coward

        Re: Buzzword bingo

        No, to me it souded like the USG said 'Oh fuck, we're still not though exploiting that bug, you can't announce it yet, let alone fix it'

    8. Anonymous Coward
      Anonymous Coward

      @VoiceOfTruth - Re: Buzzword bingo

      'Highly sophisticated' government goons -

      in translation, we're inept at security, let's blame Russia since they can't defend themselves and this will make us look good as a victim.

  2. Anonymous Coward
    Anonymous Coward

    no title needed

    The US Justice Department allowed F5 to delay the disclosure, which underscores the seriousness of the breach.

    Dear other countries. Fine F5 until they bleed for doing this to you and your institutions.

  3. Anonymous Coward
    Anonymous Coward

    Holy source code batman

    This is the source code that historically had more holes than a very holey bucket.

    More than 50 major vulnerabilities over the years.

    I'm surprised the hackers even wanted the source code since BIG IP has been compromised nearly as many times as Netscaler has.

    1. BartyFartsLast Silver badge

      Re: Holy source code batman

      I would have thought that was *exactly* why they wanted the source, so they could find a bucket load more compromises

      1. GNU Enjoyer
        Angel

        Re: Holy source code batman

        You don't need the source code to find vulnerabilities - it just makes doing so more convenient and faster (which results in no practical difference when faced with a skilled enough, or attacker with enough resources).

        Still, usually only attackers can be bothered to trawl through object code for vulnerabilities, while many people are happy to look through source code of free software and report vulnerabilities and sometimes even supply patches - therefore how the source code has been withheld and is going to continue being withheld has only ensured that the vulnerabilities won''t get fixed.

  4. Nate Amsden Silver badge

    Hard to steal the nginx code

    When they release it freely https://github.com/nginx/nginx -- am sure there are probably some closed source addon bits that F5 makes though. Certainly will be a tough situation in the near future for F5 load balancer security. Citrix (who make Netscaler, probably F5's main competitor features/performance wise) got hacked as well at some point though I don't think any source code was claimed to be taken only business data.

    1. Paul Crawford Silver badge

      Re: Hard to steal the nginx code

      I was going to say just that, but in my case OpenWRT - if the code is open then your washing has to be white enough, not dirty but hidden in the the secret corporate washing basin.

    2. Roland6 Silver badge

      Re: Hard to steal the nginx code

      However, just because the code is public doesn’t mean it doesn’t contain security holes, which someone is exploiting and keeping quiet…

  5. Anonymous Coward
    Anonymous Coward

    Hackers went for the Jackpot

    Not sure what defines highly sophisticated hacker or not but clearly they went for the Jackpot Bingo. Application Delivery Controller or ADC is a single point of exposure of all traffic that goes through F5 that would be a magnet for hackers. It breaks all norms of security by concentrating in the same venue all the secret keys for every service that is on-boarded to the ADC. It is a matter of time until someone gets its hands on it. Otherwise no hacker would bother to go to break F5 if the traffic that goes through it is end to end encrypted. It was unwise and dumb idea from the begining and only to support security of lax architecture in the back end. Now those all that were calling that is the only secure way to go about it are reaping their fruits. It was not at all driven from security point of view but more about sales, project check mark and also about sniffing transfers in the internal network for data loss prevention or DLP. Well those who pushed it all are not anymore around to be asked about it. Next all the secret vaults and smillar things.

  6. Aldnus

    who said its not a bit closer to home

    Any one wondering that GCHQ may also be hacking to find the loopholes as F5 are the new kids on the block.

    1. Roland6 Silver badge

      Re: who said its not a bit closer to home

      Well all those students studying cybersecurity; they need some real world experience to put on their CV’s…

      I remember a friend who worked as a copywriter, they had a folio of work that got shown at interview but would never otherwise see the light of day(*) - its intent was to showcase their creativity.

      (*) example: pile of bodies from some African conflict, youth gun wielding men standing around all wearing Nike’s, slogan “just do it”.

  7. Aldnus

    and where is the hardware made

    Yep

    US

    Mexico and ROC

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like