Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts 

Posted on October 16, 2025October 16, 2025 By CWS

Extra info has come to gentle on the cyberattack disclosed on Wednesday by safety and software supply options supplier F5.

F5 blamed the assault on an unspecified nation-state risk actor. Instantly after the information broke, SecurityWeek reported that the assault profile factors to China because the potential risk actor. 

Chinese language hackers are recognized to focus on BIG-IP home equipment. As well as, Google reported not too long ago that Chinese language cyberspies had focused SaaS and know-how firms in an effort to acquire worthwhile knowledge, together with supply code that might be analyzed in seek for zero-day vulnerabilities. The assault concerned a chunk of malware named Brickstorm. 

Though it has not publicly stated so, F5 additionally believes China is behind the assault, based on a report by Bloomberg. The publication additionally reported that F5 has been offering prospects a risk looking information specializing in the Brickstorm malware. 

F5 prospects have been instructed that the hackers dwelled within the firm’s community for a minimum of 12 months, which is consistent with Google’s latest Brickstorm report, which said that the Chinese language cyberspies had lurked in victims’ networks, on common, for practically 400 days. 

Google Menace Intelligence Group and Mandiant linked the Brickstorm assault to a risk actor tracked as UNC5221. 

Mandiant and CrowdStrike have been referred to as in to help F5 with investigating the incident and securing its programs.

F5 stated the hackers, whose presence was found on its programs on August 9, had accessed and exfiltrated some information, together with supply code of its BIG-IP flagship platform and knowledge on undisclosed vulnerabilities.Commercial. Scroll to proceed studying.

The seller stated it’s not conscious of any undisclosed important or distant code execution vulnerabilities that might be exploited by the attacker, and there’s no proof that private flaws have been exploited in assaults.

Nonetheless, the corporate not too long ago introduced rotating its signing certificates and keys used to cryptographically signal BIG-IP merchandise. As well as, F5 introduced on Wednesday the provision of patches for a giant batch of vulnerabilities affecting BIG-IP and different merchandise. 

Greater than two dozen of the patched vulnerabilities have been assigned a ‘excessive severity’ score. They are often exploited to bypass safety mechanisms, escalate privileges, and trigger a denial of service (DoS) situation. 

A overwhelming majority of the failings might be exploited for DoS assaults and solely a lot of these vulnerabilities might be exploited remotely with out authentication, whereas the remaining require authentication and in some instances elevated privileges. 

F5 stated the attackers additionally stole information from an engineering information administration platform, which included configuration or implementation knowledge for a small proportion of consumers.

Nonetheless, the corporate has not discovered proof of provide chain tampering, together with supply code or construct/launch pipeline modifications. As well as, there isn’t any indication of knowledge theft from different programs.

“Now we have no proof that the risk actor accessed or modified the NGINX supply code or product improvement atmosphere, nor do now we have proof they accessed or modified our F5 Distributed Cloud Companies or Silverline programs,” F5 stated.

However, the incident may pose a danger to organizations utilizing F5 merchandise. Cybersecurity companies in america and the UK have issued alerts to warn authorities and different organizations in regards to the potential risk. 

Within the US, CISA warned that the theft of supply code and vulnerability info “poses an imminent risk to federal networks utilizing F5 units and software program”. 

The company issued an emergency directive instructing authorities organizations to stock BIG-IP {hardware} and software program, set up out there patches as quickly as attainable (no later than October 31), harden internet-facing home equipment, and disconnect units which have reached finish of assist. As well as, some companies could also be notified by CISA of a BIG-IP cookie leakage vulnerability. 

“The risk actor’s entry to F5’s proprietary supply code may present that risk actor with a technical benefit to take advantage of F5 units and software program,” CISA stated. “The risk actor’s entry may allow the flexibility to conduct static and dynamic evaluation for identification of logical flaws and zero-day vulnerabilities in addition to the flexibility to develop focused exploits.”

The UK’s Nationwide Cyber Safety Centre (NCSC) issued comparable suggestions, noting, “Profitable exploitation of the impacted F5 merchandise may allow a risk actor to entry embedded credentials and API keys, transfer laterally inside an organisation’s community, exfiltrate knowledge, and set up persistent system entry.”

Associated: Harvard Is First Confirmed Sufferer of Oracle EBS Zero-Day Hack

Associated: Excessive-Severity Vulnerabilities Patched by Fortinet and Ivanti

Security Week News Tags:Alerts, Attack, BIGIP, China, Flaws, Governments, Hack, Issue, Linked, Patched

Post navigation

Previous Post: Critical Samba RCE Vulnerability Enables Arbitrary Code Execution
Next Post: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More

Related Posts

Critical Vulnerability Patched in SAP NetWeaver Security Week News
Order out of Chaos – Using Chaos Theory Encryption to Protect OT and IoT Security Week News
Approov Raises $6.7 Million for Mobile App Security Security Week News
Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage  Security Week News
Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks Security Week News
US Seizes $2.8 Million From Zeppelin Ransomware Operator Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Organizations Warned of Exploited Adobe AEM Forms Vulnerability
  • How to Assess and Choose the Right AI-SOC Platform
  • Cisco Routers Hacked for Rootkit Deployment
  • Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data
  • Beware the Hidden Costs of Pen Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Organizations Warned of Exploited Adobe AEM Forms Vulnerability
  • How to Assess and Choose the Right AI-SOC Platform
  • Cisco Routers Hacked for Rootkit Deployment
  • Capita To pay £14 Million For Data Breach Exposes 6.6 Million Users Personal Data
  • Beware the Hidden Costs of Pen Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News