Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data

Posted on October 15, 2025October 15, 2025 By CWS

F5 was just lately focused by state-sponsored risk actors who managed to steal delicate info from the corporate’s methods.

The safety and software supply options supplier revealed in an SEC submitting on Wednesday that the hackers maintained long-term and chronic entry to a few of its methods, together with ones related to the event of the corporate’s BIG-IP flagship platform.

The attackers managed to exfiltrate some information, together with ones containing BIG-IP supply code and knowledge on undisclosed vulnerabilities. Nonetheless, F5 says it’s not conscious of any personal vulnerabilities which are crucial or permit distant code execution, and it’s additionally not conscious of any energetic exploitation of undisclosed flaws. 

“Now we have no proof of modification to our software program provide chain, together with our supply code and our construct and launch pipelines,” F5 stated, including “Now we have no proof that the risk actor accessed or modified the NGINX supply code or product growth setting, nor do now we have proof they accessed or modified our F5 Distributed Cloud Providers or Silverline methods.”

The corporate additionally identified that there is no such thing as a proof the hackers accessed or stole knowledge from its CRM, monetary, iHealth, or help case administration methods. 

Some information exfiltrated from an engineering information administration platform contained configuration and implementation knowledge pertaining to a “small proportion” of consumers. These information are being reviewed and prospects shall be straight notified if wanted.

In keeping with F5, it detected the assault on August 9, but it surely was given permission by the US Justice Division to delay disclosure. 

Public corporations are required to reveal any materials cybersecurity incident inside 4 enterprise days except granted a delay by the Justice Division. F5’s Wednesday submitting signifies that the incident has not had a cloth influence on its operations and it’s nonetheless within the strategy of figuring out whether or not its monetary situation or outcomes of operations shall be affected. Commercial. Scroll to proceed studying.

F5 has not shared any extra info on the perpetrator, however the assault profile factors to China because the potential risk actor.

Chinese language state-sponsored hackers are identified for concentrating on main software program corporations to search out undisclosed vulnerabilities.

As an example, following the latest ToolShell assaults concentrating on SharePoint servers, Microsoft reportedly launched an investigation to find out whether or not Chinese language nation-state risk actors had obtained info on the exploited SharePoint vulnerabilities from corporations enrolled in its Microsoft Lively Protections Program (MAPP), by means of which distributors obtain details about crucial flaws forward of most people. 

Google’s Menace Intelligence Group and Mandiant reported just lately {that a} marketing campaign attributed to Chinese language cyberspies focused software-as-a-service (SaaS) and know-how industries, and one of many attackers’ targets might have been to steal supply code that they may analyze in seek for zero-day vulnerabilities. 

As well as, Chinese language hackers are identified to have focused BIG-IP home equipment of their assaults. 

Associated: Chinese language Cyberspies Hacked US Protection Contractors

Associated: Chinese language Silk Storm Hackers Focusing on A number of Industries in North America

Associated: Particulars Emerge on Chinese language Hacking Operation Impersonating US Lawmaker

Security Week News Tags:Blames, Code, Data, Hackers, NationState, Source, Theft, Vulnerability

Post navigation

Previous Post: Webinar Today: Fact vs. Fiction – The Truth About API Security
Next Post: Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks

Related Posts

Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations Security Week News
Microsoft Boosts .NET Bounty Program Rewards to $40,000 Security Week News
Coinbase Says Rogue Contractor Data Breach Affects 69,461 Users Security Week News
ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets Security Week News
Organizations Warned of Interlock Ransomware Attacks Security Week News
Hackers Earn Over $1 Million at Pwn2Own Berlin 2025 Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How SOCs Detect More Threats without Alert Overload
  • Chinese APT Group IT Service Provider Leveraging Microsoft Console Debugger to Exfiltrate Data
  • Microsoft October 2025 Security Update Causes Active Directory Sync Issues on Windows Server 2025
  • New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands
  • Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How SOCs Detect More Threats without Alert Overload
  • Chinese APT Group IT Service Provider Leveraging Microsoft Console Debugger to Exfiltrate Data
  • Microsoft October 2025 Security Update Causes Active Directory Sync Issues on Windows Server 2025
  • New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands
  • Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News