Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data

F5 Blames Nation-State Hackers for Theft of Source Code and Vulnerability Data

Posted on October 15, 2025October 15, 2025 By CWS

F5 was just lately focused by state-sponsored risk actors who managed to steal delicate info from the corporate’s methods.

The safety and software supply options supplier revealed in an SEC submitting on Wednesday that the hackers maintained long-term and chronic entry to a few of its methods, together with ones related to the event of the corporate’s BIG-IP flagship platform.

The attackers managed to exfiltrate some information, together with ones containing BIG-IP supply code and knowledge on undisclosed vulnerabilities. Nonetheless, F5 says it’s not conscious of any personal vulnerabilities which are crucial or permit distant code execution, and it’s additionally not conscious of any energetic exploitation of undisclosed flaws. 

“Now we have no proof of modification to our software program provide chain, together with our supply code and our construct and launch pipelines,” F5 stated, including “Now we have no proof that the risk actor accessed or modified the NGINX supply code or product growth setting, nor do now we have proof they accessed or modified our F5 Distributed Cloud Providers or Silverline methods.”

The corporate additionally identified that there is no such thing as a proof the hackers accessed or stole knowledge from its CRM, monetary, iHealth, or help case administration methods. 

Some information exfiltrated from an engineering information administration platform contained configuration and implementation knowledge pertaining to a “small proportion” of consumers. These information are being reviewed and prospects shall be straight notified if wanted.

In keeping with F5, it detected the assault on August 9, but it surely was given permission by the US Justice Division to delay disclosure. 

Public corporations are required to reveal any materials cybersecurity incident inside 4 enterprise days except granted a delay by the Justice Division. F5’s Wednesday submitting signifies that the incident has not had a cloth influence on its operations and it’s nonetheless within the strategy of figuring out whether or not its monetary situation or outcomes of operations shall be affected. Commercial. Scroll to proceed studying.

F5 has not shared any extra info on the perpetrator, however the assault profile factors to China because the potential risk actor.

Chinese language state-sponsored hackers are identified for concentrating on main software program corporations to search out undisclosed vulnerabilities.

As an example, following the latest ToolShell assaults concentrating on SharePoint servers, Microsoft reportedly launched an investigation to find out whether or not Chinese language nation-state risk actors had obtained info on the exploited SharePoint vulnerabilities from corporations enrolled in its Microsoft Lively Protections Program (MAPP), by means of which distributors obtain details about crucial flaws forward of most people. 

Google’s Menace Intelligence Group and Mandiant reported just lately {that a} marketing campaign attributed to Chinese language cyberspies focused software-as-a-service (SaaS) and know-how industries, and one of many attackers’ targets might have been to steal supply code that they may analyze in seek for zero-day vulnerabilities. 

As well as, Chinese language hackers are identified to have focused BIG-IP home equipment of their assaults. 

Associated: Chinese language Cyberspies Hacked US Protection Contractors

Associated: Chinese language Silk Storm Hackers Focusing on A number of Industries in North America

Associated: Particulars Emerge on Chinese language Hacking Operation Impersonating US Lawmaker

Security Week News Tags:Blames, Code, Data, Hackers, NationState, Source, Theft, Vulnerability

Post navigation

Previous Post: Webinar Today: Fact vs. Fiction – The Truth About API Security
Next Post: GhostBat RAT Android Malware With Fake RTO Apps Steals Targeting Indian Users to Steal Banking Data

Related Posts

Critical Wing FTP Server Vulnerability Exploited Critical Wing FTP Server Vulnerability Exploited Security Week News
Trump Signs Executive Order to Block State AI Regulations Trump Signs Executive Order to Block State AI Regulations Security Week News
Aspire Rural Health System Data Breach Impacts Nearly 140,000 Aspire Rural Health System Data Breach Impacts Nearly 140,000 Security Week News
Splunk Releases Critical Security Fixes for Vulnerabilities Splunk Releases Critical Security Fixes for Vulnerabilities Security Week News
isVerified Emerges From Stealth With Voice Deepfake Detection Apps isVerified Emerges From Stealth With Voice Deepfake Detection Apps Security Week News
Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark