Yazılar

US cybersecurity firm F5 breach linked to Chinese state-backed hackers, sources say

A breach at U.S.-based cybersecurity company F5 has been attributed to state-backed hackers from China, according to two people familiar with the investigation. The revelation comes a day after U.S. officials warned that federal networks using F5 products were being targeted by a “nation-state cyber threat actor.”

Sources told Reuters that the hackers had been inside F5’s network for over a year, gaining access to sensitive files, including parts of the company’s source code and details about vulnerabilities that could be exploited to attack government and corporate systems.

The Cybersecurity and Infrastructure Security Agency (CISA) said the breach posed an imminent threat to U.S. federal networks and urged immediate patching and updates to F5 devices. Acting Director Madhu Gottumukkala warned that the same vulnerabilities could lead to “a catastrophic compromise of critical information systems” across sectors.

F5, which provides security and networking products to both public and private clients, has not commented on the attribution. The company previously confirmed unauthorized access to some internal systems but said its operations were unaffected.

Responding to the allegation, Chinese Embassy spokesperson Liu Pengyu said Beijing “opposes and combats hacking activities in accordance with the law” and criticized what it called “false information for political purposes.”

U.S. investigators are continuing to assess the full scope of the breach, which highlights the persistent cybersecurity risks facing key technology providers in both government and industry supply chains.

U.S. Investigates Malware Email Linked to China Targeting Trade Talks

U.S. authorities are probing a malware-laden email disguised as coming from Republican Representative John Moolenaar, aimed at infiltrating organizations connected to U.S.-China trade negotiations, the Wall Street Journal reported Sunday.

The July email was sent to trade groups, law firms, and government agencies, asking recipients to review draft legislation. Cyber analysts traced the malware to APT41, a hacking group widely believed to be linked to Chinese intelligence. Opening the attachment would have given hackers deep access to the targets’ systems.

Moolenaar, a vocal critic of Beijing and chair of a congressional committee on U.S.-China competition, said the incident was “another example of Chinese cyber operations aimed at stealing U.S. strategy,” adding: “We will not be intimidated.”

The attack coincided with sensitive trade talks in Sweden, which temporarily extended a tariff truce between Donald Trump and Xi Jinping until their expected November meeting at an Asian economic summit.

The Chinese embassy in Washington denied knowledge of the incident, stressing opposition to all cyberattacks while warning against “smearing others without solid evidence.”

The FBI confirmed it is working with partners to track those responsible. Meanwhile, the Capitol Police are investigating after staff on Moolenaar’s committee noticed unusual inquiries about the fake message.

The episode adds to mounting evidence of Beijing-linked cyber campaigns targeting U.S. institutions to gain insight into trade and national security deliberations.