A China-nexus state-sponsored actor called Velvet Ant was observed conducting espionage after establishing persistence in a large organization’s network for three years by exploiting two legacy F5 BigIP appliances with outdated, vulnerable operating systems.In a June 17 blog post, Sygnia researchers explained that F5 Big-IP load balancer appliances occupy a trusted position within the network, often placed at the perimeter or between different network segments. By compromising such a device, the researchers said attackers can exert significant control over network traffic without arousing suspicion. The researchers said Velvet Ant used the tools and techniques typically associated with Chinese state-sponsored threat actors. For example, the attacks had a clear definition of goals, targeting of network devices, exploitation of vulnerabilities, and a toolset that includes the ShadowPad and PlugX malware families, as well as the use of DLL side-loading techniques.Velvet Ant was very crafty and slippery, which made it possible for gain access to sensitive data, the researchers said. “After one foothold was discovered and remediated, the threat actor swiftly pivoted to another, demonstrating agility and adaptability in evading detection. The threat actor also exploited various entry points across the victim’s network infrastructure, indicating a comprehensive understanding of the target’s environment.”
Network Security, Malware, Threat Intelligence
China-linked group exploited legacy F5 BigIP appliances for 3 years

Credit: Adobe Stock Images
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds