Threat actors exploit F5 BIG-IP vulnerability to wipe devices

clock • 3 min read
Although patched, threat actors are able to exploit the flaw on vulnerable devices
Image:

Although patched, threat actors are able to exploit the flaw on vulnerable devices

Threat actors are using a vulnerability to wipe endpoints' file systems and render them unusable.

Security researchers from SANS Internet Storm Center told BleepingComputer that their honeypots received two attempts at an attack from a single IP address, both trying to run the "rm -rf /*" comma...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
NCSC CTO: UK tech sector not incentivising companies to build secure software

Security Technology

Calls for market reform to usher in secure future tech

clock 17 May 2024 • 2 min read
'Levelling up cybersecurity is a team effort,' says Jacob DePriest of GitHub

Open Source

But security starts with developers, and AI isn’t going to replace them

clock 09 May 2024 • 5 min read
CISA identifies GitLab vulnerability under exploit

Threats and Risks

Hope you have two-factor

clock 03 May 2024 • 2 min read

More on Threats and Risks

Deepfake fraud costs engineering giant Arup £20m

Deepfake fraud costs engineering giant Arup £20m

An employee was tricked into participating in a video conference, featuring a digitally recreated version of the CFO

clock 20 May 2024 • 2 min read
Russian criminals use Lunar malware to breach European government agency

Russian criminals use Lunar malware to breach European government agency

Attackers thought to be part of Russia's FSB

Tom Allen
clock 17 May 2024 • 2 min read
Microsoft May Patch Tuesday fixes two actively exploited zero days

Microsoft May Patch Tuesday fixes two actively exploited zero days

Microsoft has fixed 60 Windows CVEs in its May Patch Tuesday update, two of which are actively exploited zero days. One is a critical vulnerability, earning an 8.8 CVSS rating.

John Leonard
clock 15 May 2024 • 3 min read