Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Chinese Hackers Target F5 Load Balancers
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Chinese Hackers Target F5 Load Balancers

Highlights

  • Chinese hackers exploited F5 load balancers for two years.

  • Attackers used sophisticated techniques like DLL hijacking and PlugX malware.

  • Effective defense strategies involve hardening legacy systems and limiting network traffic.

Ethan Moreno
Last updated: 18 June, 2024 - 8:46 am 8:46 am
Ethan Moreno 11 months ago
Share
SHARE

Cybersecurity researchers at Sygnia have uncovered that Chinese threat actors have been exploiting F5 load balancers in targeted attacks over the past two years. These devices are essential in managing traffic across enterprise networks, and their compromise could lead to severe consequences such as the exposure of sensitive data and disruption of services. Sygnia’s investigation revealed the persistence and sophistication of the attackers, emphasizing the ongoing challenges in securing these critical infrastructures. Detailed analysis of the incident can be found here.

Contents
Threat Actors and TechniquesPersistent Intrusion and Countermeasures

Threat Actors and Techniques

Sygnia identified that the Velvet Ant threat group had infiltrated an organization’s system for over two years, demonstrating a deep understanding of its complex architecture. The attackers employed execution flow hijacking methods, such as DLL search order hijacking, to regain access to the compromised systems. Despite initial remediation efforts, the attackers persisted by exploiting outdated servers and unpatched network appliances.

Further, the attackers shifted their focus to legacy Windows Server 2003 systems, deploying PlugX malware. PlugX, a modular remote access trojan, is known for its capability to hijack legitimate processes through DLL side-loading. This sophisticated approach allowed the attackers to maintain a foothold in the network by leveraging legacy vulnerabilities.

Persistent Intrusion and Countermeasures

Sygnia’s efforts revealed that after compromising newer Windows systems, the attackers disabled the Endpoint Detection and Response (EDR) product before redeploying PlugX malware. They achieved lateral movement using Impacket and executed remote commands via WMI. PlugX was reconfigured to use an internal file server as a covert Command-and-Control (C2) channel.

The investigation traced the compromise back to an outdated F5 load balancer that tunneled traffic between the C2 server and the infected file server. This allowed the attackers to perform reconnaissance and propagate the PlugX malware across older networks using SMB and WMI protocols. Four specific binaries were deployed by the attackers: VELVETSTING, VELVETTAP, SAMRID, and ESRDE.

The research highlights the continued use of shared tools and infrastructure by Chinese intrusion sets. Despite extensive efforts to remove the threat, the attackers remained embedded in the compromised network for approximately three years. However, limited visibility prevented definitive attribution and ruled out false-flag operations by other advanced persistent threat groups.

Comparing current findings with past incidents shows that Chinese threat actors consistently exploit legacy systems and unpatched devices to maintain long-term access. The persistence of these attackers underscores the necessity for continuous monitoring and updating of critical network components. Previously, similar methods and malware variants have been used to achieve prolonged access and control over targeted systems.

This sustained intrusion into enterprise networks highlights the cyber adversaries’ evolving tactics and the importance of proactive defense strategies. Organizations must prioritize the security hardening of legacy systems, restrict unnecessary network traffic, and implement robust endpoint protection to mitigate such sophisticated threats.

Effective countermeasures include limiting outbound internet traffic, enhancing security hardening of legacy servers, and protecting public-facing devices. These strategies are critical in preventing credential harvesting and limiting lateral movement within networks.

Sygnia’s findings underscore the importance of vigilant cybersecurity practices and the need for continuous adaptation to evolving threats. Organizations must remain proactive in updating and securing their network infrastructures to prevent similar exploits. Understanding and implementing these defense strategies can significantly enhance an organization’s resilience against advanced persistent threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Trump Urges Colorado to Release Jailed Clerk Over Election Breach

Google Targets Vulnerabilities in May Security Update

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article NATO to invest $1.1 billion in AI, robotics and space technology
Next Article VMware Identifies Critical Vulnerabilities in vCenter Server

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Sonair Unveils ADAR Sensor to Enhance Robot Safety
Robotics
Apple Plans to Add Camera to Future Apple Watch Models
Wearables
Mazda Partners with Tesla for Charging Standard Shift
Electric Vehicle
Trump Alters AI Chip Export Strategy, Reversing Biden Controls
AI
Solve Wordle’s Daily Puzzle with These Expert Tips
Gaming
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?