{"id":305756,"date":"2025-10-15T16:11:22","date_gmt":"2025-10-15T16:11:22","guid":{"rendered":"https:\/\/www.europesays.com\/us\/305756\/"},"modified":"2025-10-15T16:11:22","modified_gmt":"2025-10-15T16:11:22","slug":"f5-says-hackers-stole-undisclosed-big-ip-flaws-source-code","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/305756\/","title":{"rendered":"F5 says hackers stole undisclosed BIG-IP flaws, source code"},"content":{"rendered":"<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"F5\" height=\"900\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/10\/F5.jpg\" width=\"1600\"\/><\/p>\n<p>U.S. cybersecurity company F5 disclosed that nation-state\u00a0hackers breached its systems and stole undisclosed BIG-IP security vulnerabilities and source code.<\/p>\n<p>The company states that it first became aware of the breach\u00a0on August 9, 2025, with its\u00a0investigations revealing that the attackers had gained long-term access to its system, including the company&#8217;s BIG-IP product development environment and engineering knowledge management platform.<\/p>\n<p>F5 is a Fortune 500 tech giant specializing in cybersecurity, cloud management, and application delivery networking (ADN) applications. The company has 23,000 customers in 170 countries, and 48 of the Fortune 50 entities use its products.<\/p>\n<p>BIG-IP is the firm&#8217;s flagship product used for application delivery\u00a0and traffic management by many large enterprises worldwide.<\/p>\n<p>No supply-chain risk<\/p>\n<p>It\u2019s unclear how long the hackers maintained access, but the company confirmed that they\u00a0stole source code, vulnerability data, and some\u00a0configuration and implementation details for a limited number of customers.<\/p>\n<p>&#8220;Through this access, certain files were exfiltrated, some of which contained certain portions of the Company&#8217;s BIG-IP source code and information about undisclosed vulnerabilities that it was working on in BIG-IP,&#8221; the company <a href=\"https:\/\/my.f5.com\/manage\/s\/article\/K000154696\" target=\"_blank\" rel=\"nofollow noopener\">states<\/a>.<\/p>\n<p>Despite this critical exposure of undisclosed flaws, F5 says there&#8217;s no evidence that the attackers leveraged the information in actual attacks, such as exploiting\u00a0the undisclosed flaw against systems. The company also states that it has not seen evidence that the private information has been disclosed.<\/p>\n<p>F5 claims that the threat actors&#8217; access to the BIG-IP environment did not compromise its software supply chain or result in any suspicious code modifications.<\/p>\n<p>This includes its platforms that contain customer data, such as its CRM, financial, support case management, or iHealth systems. Furthermore, other products and platforms managed by the company are not compromised, including NGINX, F5 Distributed Cloud Services, or Silverline systems&#8217; source code.<\/p>\n<p>Response to the breach<\/p>\n<p>After discovering the intrusion, F5 took remediation action by tightening access to its systems, and improving\u00a0its overall threat monitoring, detection, and response capabilities:<\/p>\n<ul lwc-4nfn2rc40ch=\"\">\n<li lwc-4nfn2rc40ch=\"\">Rotated credentials and strengthened access controls across our systems.<\/li>\n<p>&#13;<\/p>\n<li lwc-4nfn2rc40ch=\"\">Deployed improved inventory and patch management automation, as well as additional tooling to better monitor, detect, and respond to threats.<\/li>\n<p>&#13;<\/p>\n<li lwc-4nfn2rc40ch=\"\">Implemented enhancements to our network security architecture.<\/li>\n<p>&#13;<\/p>\n<li lwc-4nfn2rc40ch=\"\">Hardened our product development environment, including strengthening security controls and monitoring of all software development platforms.<\/li>\n<p>&#13;\n<\/ul>\n<p>Additionally, the company also focuses\u00a0on the security of its products through source code reviews and security assessements\u00a0with support from NCC Group and IOActive.<\/p>\n<p>NCC Group&#8217;s <a href=\"http:\/\/raw.githubusercontent.com\/askf5\/K000154696\/main\/NCC_Group_Bedrock_Letter_of_Engagement_Oct_10_2025_1.pdf\" target=\"_blank\" rel=\"nofollow noopener\">assessment covered security reviews<\/a> of critical software components in BIG-IP and portions of the development pipeline in an effort that involved 76 consultants.<\/p>\n<p>IOActive&#8217;s expertise was called in after the security breach and the <a href=\"http:\/\/raw.githubusercontent.com\/askf5\/K000154696\/main\/IOActive_Security_Review_2025_Attestation_Letter.pdf\" target=\"_blank\" rel=\"nofollow noopener\">engagement is still in progress<\/a>. The results so far show no evidence of the threat actor introducing vulnerablities in critical F5 software source code or\u00a0the software development build pipeline.<\/p>\n<p>Customers should take action<\/p>\n<p>F5 is still reviewing which customers had their configuration or implementation details stolen and will contact them with guidance.<\/p>\n<p>To help customers secure their F5 environments against risks stemming from the breach, the company released updates for\u00a0\u00a0BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients.<\/p>\n<p>Despite any evidence &#8220;of undisclosed critical or remote code execution vulnerabilities,&#8221; the company urges customers to prioritize installing the new BIG-IP software updates.\u00a0<\/p>\n<p>Furthermore, F5 support makes available a threat hunting guide for customers to improve detection and monitoring in their environment.<\/p>\n<p>New\u00a0best practices for hardening F5 systems now include automated checks to the\u00a0<a href=\"https:\/\/www.f5.com\/support\/big-ip-ihealth-diagnostic-tool\" lwc-4nfn2rc40ch=\"\" target=\"_blank\" rel=\"nofollow noopener\">F5 iHealth Diagnostic Tool<\/a>, which can now\u00a0flag\u00a0security risks, vulnerabilities, prioritize\u00a0actions, and provide remediation guidance.<\/p>\n<p>Another recommendation is to enable\u00a0BIG-IP event streaming to\u00a0SIEM and configure the systems to <a href=\"https:\/\/my.f5.com\/manage\/s\/article\/K13080\" target=\"_blank\" rel=\"nofollow noopener\">log to a remote syslog server<\/a> and <a href=\"https:\/\/my.f5.com\/manage\/s\/article\/K13426\" target=\"_blank\" rel=\"nofollow noopener\">monitor for login attempts<\/a>.<\/p>\n<p>&#8220;Our global support team is available to assist. You can open a MyF5 support case or contact F5 support directly for help updating your BIG-IP software, implementing any of these steps, or to address any questions you may have&#8221; &#8211; <a href=\"https:\/\/my.f5.com\/manage\/s\/article\/K000154696\" target=\"_blank\" rel=\"nofollow noopener\">F5<\/a><\/p>\n<p>The company added that it has validated the safety of BIG-IP releases through multiple independent reviews by leading cybersecurity firms, including CrowdStrike and Mandiant.<\/p>\n<p>Additional guidance for F5 customers comes from\u00a0UK&#8217;s National Cyber Security Centre (NCSC) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA).<\/p>\n<p>Both agencies recommmend\u00a0identifying all F5 products (hardware, software, and virtualized) and making sure that no management interface is exposed on the public web. If an exposed interface is discovered, companies should make compromise assessment.<\/p>\n<p>F5 notes that it delayed the public disclosure of the incident at the U.S. government&#8217;s request, presumably to allow enough time to secure critical systems.<\/p>\n<p>&#8220;On September 12, 2025, the U.S. Department of Justice determined that a delay in public disclosure was warranted pursuant to Item 1.05(c) of Form 8-K. F5 is now filing this report in a timely manner,&#8221; explains F5.<\/p>\n<p>F5 states that the incident has no material impact on its operations. All services remain available and are considered safe, based on the latest available evidence.<\/p>\n<p>BleepingComputer has contacted F5 to request more details about the incident, and we will update this post when we receive a response.<\/p>\n<p>This is a developing story.<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03LvVKm0\" target=\"_blank\" rel=\"noopener sponsored nofollow\"><br \/>\n            <img decoding=\"async\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/10\/bas-summit.jpg\" alt=\"Picus BAS Summit\"\/><br \/>\n        <\/a><\/p>\n<p>Join the <strong>Breach and Attack Simulation Summit<\/strong> and experience the <strong>future of security validation<\/strong>. Hear from top experts and see how <strong>AI-powered BAS<\/strong> is transforming breach and attack simulation.<\/p>\n<p>Don&#8217;t miss the event that will shape the future of your security strategy<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03LvVKm0\" target=\"_blank\" rel=\"noopener sponsored nofollow\">Register Now<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"U.S. cybersecurity company F5 disclosed that nation-state\u00a0hackers breached its systems and stole undisclosed BIG-IP security vulnerabilities and source&hellip;\n","protected":false},"author":3,"featured_media":305757,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[64,67,132,68],"class_list":{"0":"post-305756","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"tag-business","9":"tag-united-states","10":"tag-unitedstates","11":"tag-us"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115379063620822086","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/305756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=305756"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/305756\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/305757"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=305756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=305756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=305756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}