Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data

Posted on October 15, 2025October 16, 2025 By CWS

F5, a number one supplier of utility safety and supply options, disclosed a significant safety incident. The corporate revealed {that a} subtle nation-state menace actor had gained long-term entry to inner techniques, exfiltrating delicate information together with BIG-IP supply code and particulars on undisclosed vulnerabilities.

Whereas F5 emphasised that no important exploits or lively assaults on clients have been detected, the breach underscores the vulnerabilities in even probably the most safe improvement environments.

The intrusion, found in August 2025, concerned persistent entry to F5’s BIG-IP product improvement setting and engineering data administration platforms.

In keeping with the corporate’s official assertion, the actor downloaded information containing proprietary supply code for its flagship BIG-IP software program, which powers load balancing and safety for thousands and thousands of enterprise purposes worldwide.

Moreover, the stolen information included info on vulnerabilities that F5 was actively researching and patching. Nevertheless, the agency pressured that these weren’t important distant code execution flaws and confirmed no indicators of exploitation within the wild.

Breach Particulars

F5’s investigation, aided by cybersecurity CrowdStrike and Mandiant, discovered no proof of tampering with the software program provide chain, together with construct pipelines or launched code.

Unbiased audits by NCC Group and IOActive corroborated this, ruling out modifications that would have launched backdoors into buyer deployments. The breach additionally spared key areas like NGINX supply code, F5 Distributed Cloud Companies, and Silverline DDoS safety techniques.

Nevertheless, some fallout reached clients. A small subset of exfiltrated information from the data platform held configuration particulars for sure BIG-IP implementations.

F5 plans to inform affected customers instantly after reviewing the information. Crucially, no buyer information from CRM, monetary techniques, help portals, or the iHealth monitoring device have been compromised, limiting broader privateness dangers.

F5 acted swiftly to include the menace, rotating credentials, bolstering entry controls, and deploying superior monitoring instruments. No additional unauthorized exercise has occurred since containment.

To safeguard customers, the corporate rolled out pressing patches for BIG-IP, F5OS, BIG-IP Subsequent for Kubernetes, BIG-IQ, and APM shoppers in its October 2025 Quarterly Safety Notification. Clients are urged to use these updates instantly, even within the absence of recognized exploits.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:BIGIP, Breached, Code, Data, Hackers, Source, Stole, Undisclosed, Vulnerabilities

Post navigation

Previous Post: GhostBat RAT Android Malware With Fake RTO Apps Steals Targeting Indian Users to Steal Banking Data
Next Post: Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks

Related Posts

Indonesia’s Gambling Ecosystem Exposed With Indicators of National-Level Cyber Operations Cyber Security News
Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover Cyber Security News
New SVG Clickjacking Attack Let Attackers Create Interactive Clickjacking Attacks Cyber Security News
Hackers Actively Exploiting ArrayOS AG VPN Vulnerability to Deploy Webshells Cyber Security News
South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members Cyber Security News
Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information
  • The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel
  • Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
  • USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information
  • The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel
  • Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
  • USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark