Forum Discussion
F5-fronted website duplicated by hackers and re-hosted
We found out recently that hackers copied one of our F5-fronted web sites and certs, and set them up on a server elsewhere. Their copied cert gives an error, of course. I’m wondering if there’s anything I could/should check on the F5 to be reasonably confident nothing beyond copying our website has been done and the F5 has not been compromised (as management will surely ask). Has anyone else dealt with this before?
Yes this is kind of a generic question, but any help would be appreciated - thanks!
there are some things to check in this article which also provides general guidance for such sitations:
https://support.f5.com/csp/article/K11438344
there is the IOC checker from the F5 vulnerability which seems to also check for webshells and other things left behind beyond that actual exploit itself.
https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker/
uploading a qkview to ihealth will also help as some things are checked and reported there.
still kind in mind that a good hacker can erase tracks so can you be 100% sure? that should be an internal discussion with the parties involved. if there is doubt then rebuild and restore a known safe backup.
Everything above.
+ contact law enforcement (might be different from country to country)
+ check for companies that could help you analyse whether a breach has happened
+ read the F5 Labs 2020 Phishing and Fraud Report
+ if you have FPS licensed, check what FPS can do to help you prevent that your web site is getting cloned. Otherwise, if you don't have FPS licensed yet, check what Shape has to offer. I think Shape AI Fraud Engine (SAFE) is their solution to prevent web site cloning.
- Fallout1984Cirrocumulus
Thanks for the info, Daniel!
there are some things to check in this article which also provides general guidance for such sitations:
https://support.f5.com/csp/article/K11438344
there is the IOC checker from the F5 vulnerability which seems to also check for webshells and other things left behind beyond that actual exploit itself.
https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker/
uploading a qkview to ihealth will also help as some things are checked and reported there.
still kind in mind that a good hacker can erase tracks so can you be 100% sure? that should be an internal discussion with the parties involved. if there is doubt then rebuild and restore a known safe backup.
I didn't know the K11438344 yet. Awesome, bookmarked it right away!
- Fallout1984Cirrocumulus
Great info - thanks!
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com