Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data

F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data

Posted on October 15, 2025October 16, 2025 By CWS

F5, a number one supplier of utility safety and supply options, disclosed a significant safety incident. The corporate revealed {that a} subtle nation-state menace actor had gained long-term entry to inner techniques, exfiltrating delicate information together with BIG-IP supply code and particulars on undisclosed vulnerabilities.

Whereas F5 emphasised that no important exploits or lively assaults on clients have been detected, the breach underscores the vulnerabilities in even probably the most safe improvement environments.

The intrusion, found in August 2025, concerned persistent entry to F5’s BIG-IP product improvement setting and engineering data administration platforms.

In keeping with the corporate’s official assertion, the actor downloaded information containing proprietary supply code for its flagship BIG-IP software program, which powers load balancing and safety for thousands and thousands of enterprise purposes worldwide.

Moreover, the stolen information included info on vulnerabilities that F5 was actively researching and patching. Nevertheless, the agency pressured that these weren’t important distant code execution flaws and confirmed no indicators of exploitation within the wild.

Breach Particulars

F5’s investigation, aided by cybersecurity CrowdStrike and Mandiant, discovered no proof of tampering with the software program provide chain, together with construct pipelines or launched code.

Unbiased audits by NCC Group and IOActive corroborated this, ruling out modifications that would have launched backdoors into buyer deployments. The breach additionally spared key areas like NGINX supply code, F5 Distributed Cloud Companies, and Silverline DDoS safety techniques.

Nevertheless, some fallout reached clients. A small subset of exfiltrated information from the data platform held configuration particulars for sure BIG-IP implementations.

F5 plans to inform affected customers instantly after reviewing the information. Crucially, no buyer information from CRM, monetary techniques, help portals, or the iHealth monitoring device have been compromised, limiting broader privateness dangers.

F5 acted swiftly to include the menace, rotating credentials, bolstering entry controls, and deploying superior monitoring instruments. No additional unauthorized exercise has occurred since containment.

To safeguard customers, the corporate rolled out pressing patches for BIG-IP, F5OS, BIG-IP Subsequent for Kubernetes, BIG-IQ, and APM shoppers in its October 2025 Quarterly Safety Notification. Clients are urged to use these updates instantly, even within the absence of recognized exploits.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:BIGIP, Breached, Code, Data, Hackers, Source, Stole, Undisclosed, Vulnerabilities

Post navigation

Previous Post: GhostBat RAT Android Malware With Fake RTO Apps Steals Targeting Indian Users to Steal Banking Data
Next Post: Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks

Related Posts

Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack Cyber Security News
Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access Windows 11 24H2 KASLR Broken Using an HVCI-Compatible Driver with Physical Memory Access Cyber Security News
Git 2.51 Released With Performance Optimizations and SHA-256 as Default hash Function Git 2.51 Released With Performance Optimizations and SHA-256 as Default hash Function Cyber Security News
Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more Cybersecurity Weekly Recap – PornHub Breach, Cisco 0-Day, Amazon Detains DPRK IT Worker, and more Cyber Security News
Microsoft Patch Tuesday January 2026 Microsoft Patch Tuesday January 2026 Cyber Security News
ShinyHunters Claims Data Theft from 200+ Companies via Salesforce Gainsight Breach ShinyHunters Claims Data Theft from 200+ Companies via Salesforce Gainsight Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News