Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

F5 Discloses Sophisticated Nation-State Breach: BIG-IP Source Code and Data Stolen


F5 has disclosed that a sophisticated nation-state actor breached its systems, stealing BIG-IP source code and data on undisclosed product vulnerabilities. The breach highlights the growing threat landscape of nation-state actors and the importance of robust cybersecurity measures.

  • F5, a leading cybersecurity firm, was breached by a sophisticated nation-state actor in August 2025.
  • The attackers stole BIG-IP source code and data on undisclosed product vulnerabilities.
  • The breach highlighted the growing threat landscape of nation-state actors and the importance of robust cybersecurity measures.
  • F5's containment efforts were successful, with no further unauthorized activity observed.
  • The breach had significant implications for F5's customers, but no signs of compromise in CRM, financial, or cloud systems.
  • F5 took proactive measures to protect its systems and customers, including rotating credentials and improving monitoring and network security.



  • F5, a leading cybersecurity firm, has disclosed that a highly sophisticated nation-state actor breached its systems, stealing BIG-IP source code and data on undisclosed product vulnerabilities. The breach, which occurred in August 2025, highlights the growing threat landscape of nation-state actors and the importance of robust cybersecurity measures.

    According to F5's notice of the Security Incident, published by the company, the attackers accessed the company's BIG-IP development and engineering systems, but containment efforts were successful, with no further unauthorized activity observed. The company reported the incident to law enforcement and is investigating the security breach with the help of leading cybersecurity firms.

    The breach had significant implications for F5's customers, as the attackers downloaded files from certain F5 systems, including BIG-IP product development environment and engineering knowledge management platforms. While some stolen files contained limited customer configuration data, F5 found no signs of compromise in its CRM, financial, or cloud systems, nor tampering with its source code or supply chain.

    F5's proactive response to the breach involved extensive containment and hardening measures to protect its systems and customers. The company rotated credentials, tightened access controls, automated patch management, and improved monitoring and network security. Additionally, F5 partnered with CrowdStrike to deploy Falcon EDR and threat hunting for BIG-IP, offering customers a free EDR subscription to bolster defenses.

    Cybersecurity agencies UK's NCSC and US CISA advise F5 customers to locate all F5 products, secure exposed management interfaces, and assess for compromise. The breach serves as a reminder of the importance of robust cybersecurity measures and the need for companies to stay vigilant in protecting their systems and data.

    In response to this incident, F5 is taking proactive measures to protect its customers and strengthen the security posture of its enterprise and product environments. The company is engaging leading external cybersecurity experts to support these activities and has filed a Form 8-K report with the U.S. Securities and Exchange Commission (SEC).

    The breach also highlights the growing threat landscape of nation-state actors, who continue to target companies with sophisticated cyber attacks. The attackers used long-term, persistent access to F5 systems, demonstrating the capabilities and motivations of these actors.

    F5's response to this breach demonstrates the company's commitment to protecting its customers and staying ahead of emerging threats. By partnering with leading cybersecurity firms and deploying robust security measures, F5 is helping to mitigate the impact of this breach and prevent future attacks.

    In conclusion, the breach of F5's systems by a sophisticated nation-state actor highlights the growing threat landscape of cyber attacks. The company's proactive response demonstrates its commitment to protecting its customers and staying ahead of emerging threats. As cybersecurity continues to evolve, companies must remain vigilant in protecting their systems and data, and invest in robust security measures to mitigate the impact of future breaches.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/F5-Discloses-Sophisticated-Nation-State-Breach-BIG-IP-Source-Code-and-Data-Stolen-ehn.shtml

  • https://securityaffairs.com/183436/security/a-sophisticated-nation-state-actor-breached-f5-systems-stealing-big-ip-source-code-and-data-on-undisclosed-flaw.html


  • Published: Thu Oct 16 23:21:35 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us