Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion

Posted on October 15, 2025October 15, 2025 By CWS

Oct 15, 2025Ravie LakshmananVulnerability / Risk Intelligence
U.S. cybersecurity firm F5 on Wednesday disclosed that unidentified risk actors broke into its techniques and stole recordsdata containing a few of BIG-IP’s supply code and data associated to undisclosed vulnerabilities within the product.
It attributed the exercise to a “extremely subtle nation-state risk actor,” including the adversary maintained long-term, persistent entry to its community. The corporate mentioned it realized of the breach on August 9, 2025, per a Kind 8-Okay submitting with the U.S. Securities and Change Fee (SEC).
“We now have taken intensive actions to include the risk actor,” it famous. “Since starting these actions, we now have not seen any new unauthorized exercise, and we imagine our containment efforts have been profitable.”

F5 didn’t say for a way lengthy the risk actors had entry to its BIG-IP product improvement surroundings, however emphasised that it has not noticed any indication that the vulnerabilities have been exploited in a malicious context. It additionally mentioned that the attackers didn’t entry its CRM, monetary, assist case administration, or iHealth techniques.
That mentioned, the corporate acknowledged that a number of the exfiltrated recordsdata from its information administration platform contained configuration or implementation data for a small share of consumers. Impacted clients are anticipated to be instantly notified following a overview of the recordsdata.
Following the invention of the incident, F5 has engaged the companies of Google Mandiant and CrowdStrike, in addition to rotated credentials and strengthened entry controls, deployed tooling to higher monitor threats, bolstered its product improvement surroundings with additional safety controls, and carried out enhancements to its community safety structure.
Customers are suggested to use the newest updates for BIG-IP, F5OS, BIG-IP Subsequent for Kubernetes, BIG-IQ, and APM purchasers as quickly as potential for optimum safety.

The Hacker News Tags:BIGIP, Breach, Code, Exposes, Hackers, Intrusion, Massive, NationState, Source

Post navigation

Previous Post: Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks
Next Post: SecurityWeek to Host 2025 ICS Cybersecurity Conference October 27-30 in Atlanta

Related Posts

Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign The Hacker News
Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools The Hacker News
Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing The Hacker News
Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices The Hacker News
New Malware Campaigns Highlight Rising AI and Phishing Risks The Hacker News
Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How SOCs Detect More Threats without Alert Overload
  • Chinese APT Group IT Service Provider Leveraging Microsoft Console Debugger to Exfiltrate Data
  • Microsoft October 2025 Security Update Causes Active Directory Sync Issues on Windows Server 2025
  • New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands
  • Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How SOCs Detect More Threats without Alert Overload
  • Chinese APT Group IT Service Provider Leveraging Microsoft Console Debugger to Exfiltrate Data
  • Microsoft October 2025 Security Update Causes Active Directory Sync Issues on Windows Server 2025
  • New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands
  • Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News