Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Cyber Espionage Unveiled: Velvet Ant’s Stealthy F5 BIG-IP Malware Attack Exposed
Velvet Ant hackers used F5 BIG-IP malware to infiltrate networks, steal data, and avoid detection for three years. They exploited outdated appliances, deploying custom malware for persistent access. Sygnia recommends replacing legacy systems and tightening security controls to counter such threats.

Hot Take:
Who knew that Velvet Ants could be such a persistent pest? This cyberespionage group turned F5 BIG-IP appliances into their own personal data highway, and they were the toll booth operators for three years without anyone noticing! Someone needs to call pest control—or better yet, an IT security expert.
Key Points:
- Chinese cyberespionage group ‘Velvet Ant’ used F5 BIG-IP appliances for persistent network access and data theft.
- The group exploited known vulnerabilities in outdated F5 BIG-IP devices to deploy custom malware.
- Malware such as PlugX, PMCD, MCDP, SAMRID, and ESRDE were used for remote control and data exfiltration.
- Attackers blended their traffic with legitimate network traffic, evading detection for nearly three years.
- Sygnia recommends a multi-layered security approach, including restricting outbound connections and prioritizing legacy system replacements.