Forum Discussion
F5-fronted website duplicated by hackers and re-hosted
- Mar 06, 2021
there are some things to check in this article which also provides general guidance for such sitations:
https://support.f5.com/csp/article/K11438344
there is the IOC checker from the F5 vulnerability which seems to also check for webshells and other things left behind beyond that actual exploit itself.
https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker/
uploading a qkview to ihealth will also help as some things are checked and reported there.
still kind in mind that a good hacker can erase tracks so can you be 100% sure? that should be an internal discussion with the parties involved. if there is doubt then rebuild and restore a known safe backup.
Everything above.
+ contact law enforcement (might be different from country to country)
+ check for companies that could help you analyse whether a breach has happened
+ read the F5 Labs 2020 Phishing and Fraud Report
+ if you have FPS licensed, check what FPS can do to help you prevent that your web site is getting cloned. Otherwise, if you don't have FPS licensed yet, check what Shape has to offer. I think Shape AI Fraud Engine (SAFE) is their solution to prevent web site cloning.
- Fallout1984Mar 16, 2021Cirrocumulus
Thanks for the info, Daniel!
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com