Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data

Posted on October 15, 2025October 16, 2025 By CWS

F5, a number one supplier of utility safety and supply options, disclosed a significant safety incident. The corporate revealed {that a} subtle nation-state menace actor had gained long-term entry to inner techniques, exfiltrating delicate information together with BIG-IP supply code and particulars on undisclosed vulnerabilities.

Whereas F5 emphasised that no important exploits or lively assaults on clients have been detected, the breach underscores the vulnerabilities in even probably the most safe improvement environments.

The intrusion, found in August 2025, concerned persistent entry to F5’s BIG-IP product improvement setting and engineering data administration platforms.

In keeping with the corporate’s official assertion, the actor downloaded information containing proprietary supply code for its flagship BIG-IP software program, which powers load balancing and safety for thousands and thousands of enterprise purposes worldwide.

Moreover, the stolen information included info on vulnerabilities that F5 was actively researching and patching. Nevertheless, the agency pressured that these weren’t important distant code execution flaws and confirmed no indicators of exploitation within the wild.

Breach Particulars

F5’s investigation, aided by cybersecurity CrowdStrike and Mandiant, discovered no proof of tampering with the software program provide chain, together with construct pipelines or launched code.

Unbiased audits by NCC Group and IOActive corroborated this, ruling out modifications that would have launched backdoors into buyer deployments. The breach additionally spared key areas like NGINX supply code, F5 Distributed Cloud Companies, and Silverline DDoS safety techniques.

Nevertheless, some fallout reached clients. A small subset of exfiltrated information from the data platform held configuration particulars for sure BIG-IP implementations.

F5 plans to inform affected customers instantly after reviewing the information. Crucially, no buyer information from CRM, monetary techniques, help portals, or the iHealth monitoring device have been compromised, limiting broader privateness dangers.

F5 acted swiftly to include the menace, rotating credentials, bolstering entry controls, and deploying superior monitoring instruments. No additional unauthorized exercise has occurred since containment.

To safeguard customers, the corporate rolled out pressing patches for BIG-IP, F5OS, BIG-IP Subsequent for Kubernetes, BIG-IQ, and APM shoppers in its October 2025 Quarterly Safety Notification. Clients are urged to use these updates instantly, even within the absence of recognized exploits.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:BIGIP, Breached, Code, Data, Hackers, Source, Stole, Undisclosed, Vulnerabilities

Post navigation

Previous Post: GhostBat RAT Android Malware With Fake RTO Apps Steals Targeting Indian Users to Steal Banking Data
Next Post: Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks

Related Posts

Hands-on Cybersecurity Threat Hunting Guide for SOC Analysts and MSSPs Cyber Security News
New Technique Uncovered To Exploit Linux Kernel Use-After-Free Vulnerability Cyber Security News
Hackers Actively Exploiting CitrixBleed 2 Vulnerability in the Wild Cyber Security News
Lumma Infostealers Developers Trying Hard To Conduct Business As Usual Cyber Security News
Top 10 Best API Security Testing Tools in 2025 Cyber Security News
Threat Actors Weaponizing RMM Tools to Take Control of The Machine and Steal Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks
  • Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
  • Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset
  • Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys
  • Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks
  • Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
  • Hackers Weaponizing OAuth Applications for Persistent Cloud Access Even After Password Reset
  • Critical Vulnerability in MCP Server Platform Exposes 3,000 Servers and Thousands of API Keys
  • Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News