Threat actors exploit F5 BIG-IP vulnerability to wipe devices

clock • 3 min read
Although patched, threat actors are able to exploit the flaw on vulnerable devices
Image:

Although patched, threat actors are able to exploit the flaw on vulnerable devices

Threat actors are using a vulnerability to wipe endpoints' file systems and render them unusable.

Security researchers from SANS Internet Storm Center told BleepingComputer that their honeypots received two attempts at an attack from a single IP address, both trying to run the "rm -rf /*" comma...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
More cash for coders: GitHub's Stormy Peters on open source funding

Open Source

'I'm passionate about making sure that people can have a career in open source software'

clock 14 February 2024 • 4 min read
Two command injection bugs threaten Fortinet's FortiSIEM

Threats and Risks

Affect versions from October 2022 to 2024

clock 07 February 2024 • 2 min read
Mercedes Benz's source code leaked online

Threats and Risks

A Mercedes Benz authentication token was leaked in a public GitHub repository

clock 02 February 2024 • 1 min read
Most read
01

Cabinet Office terminates £9m Microsoft deal

16 February 2024 • 2 min read
03

Microsoft announces critical zero-day Exchange bug

16 February 2024 • 1 min read
05

Cisco cuts more than 4,000 jobs

15 February 2024 • 3 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

Microsoft exposes state-backed hackers using AI tools for espionage

Microsoft exposes state-backed hackers using AI tools for espionage

Hackers linked to Russian military intelligence have been using LLMs to delve into satellite communication protocols relevant to military operations in Ukraine

clock 15 February 2024 • 3 min read
France uncovers massive Russian disinformation campaign

France uncovers massive Russian disinformation campaign

Dubbed 'Portal Kombat'

Vikki Davies
clock 14 February 2024 • 2 min read
Microsoft's Patch Tuesday fixes two actively exploited vulnerabilities

Microsoft's Patch Tuesday fixes two actively exploited vulnerabilities

73 bugs fixed in February update

John Leonard
clock 14 February 2024 • 2 min read