Tuesday, October 21, 2025
Global Current News
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Data & Analytics
  • Cybersecurity
  • Public Safety
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Data & Analytics
  • Cybersecurity
  • Public Safety
No Result
View All Result
Global Current News
No Result
View All Result

Nation-state hackers behind F5 breach; source code likely stolen

by Edwin O.
October 21, 2025
in Cybersecurity
F5 Networks cyberattack breach

Airports shut down after cyberattack hits core software system

Key US cybersecurity law lapses during shutdown, halting information sharing programs

Security experts warn 50,000 Cisco firewalls remain exposed without urgent patch

F5 Networks has revealed a terrible cyberattack that gave highly privileged threat actors permanent access to critical systems and source codes. The Seattle-based cybersecurity company attributed the breach to a “highly sophisticated nation-state threat actor” that it found on August 9th. This incident marks one of the biggest cybersecurity breaches of enterprise infrastructure providers in recent years.

F5 confirms huge infrastructure targeting nation state cyberattack

F5 Networks disclosed that threat actors had “long-term, persistent access” to some of the company’s systems, which include its BIG-IP product development environment, which is widely used by Fortune 500 companies and government agencies. The attackers also penetrated the company’s engineering knowledge management platform, leaving with files containing BIG-IP source code and data about undisclosed vulnerabilities. F5 said it had no evidence of any access to CRM, financial, support case management, or iHealth, but that configuration information of a small percentage of customers was compromised.

It stressed that the company has no understanding of hidden critical or distant vulnerabilities, and it is not aware that there is active exploitation of any undisclosed F5 vulnerabilities. F5 has undertaken a broad range of actions to contain the threat actor and believes that its containment actions have been successful in that no new unauthorized activity has been detected since beginning remediation activities.

The UK’s National Cyber Security Centre said that cybercriminals could potentially use the affected F5 products to obtain embedded credentials, API keys, move laterally across organizational networks, and exfiltrate data.

Chinese state hackers have been infiltrating year-long

Sources familiar with the matter told Bloomberg, the sources have explained that Chinese State-sponsored hackers were behind the breach, and the attackers had been in F5’s network for at least 12 months. This disclosure makes it a nation-state intrusion of unusual persistence and stealth, turning the incident into one of the longest nation-state intrusions in the history of cybersecurity.

Bloomberg’s sources also revealed that F5 disclosed to affected customers about the extended timeline of the compromise, which can be held up as indicating the sophistication of the attack, and also as an obstacle for detecting advanced persistent threats. The length of the attack indicates that the attackers had plenty of time to research F5’s systems, determine what systems were valuable, and maybe even gain multiple access points across the network infrastructure.

F5 issues vital security patches after breach

As mitigation, F5 has released new versions of its BIG-IP, F5OS, BIG-IP Next with Kubernetes, BIG-IQ, and APM clients, and customers are advised to upgrade their systems immediately. The company is also rolling out enhancements to its product development environment, as well as network security architecture.

Cybersecurity industry faces growing nation-state threats

The F5 breach adds to a growing list of major cyberattacks on critical infrastructure providers and technology companies. Recent incidents involving Japanese beer maker Asahi, Jaguar Land Rover, luxury retailer Harrods, and Discord show that the landscape at the enterprise level is a persistent threat.

F5 acknowledged the severity by saying, “Your trust is important. We know it is earned every day, especially when things go wrong. The breach shows the changing sophistication of nation-state actors and their skills to gain access to key infrastructure systems over the long term.

Breach Timeline Impact Assessment
August 9, 2025: Discovery BIG-IP source code compromised
12+ months: Duration Customer configuration data stolen
October 15, 2025: Disclosure Security updates released

The incident with F5 demonstrates the great relevance of continuous monitoring and protection against active threats. As nation-state actors continue to target infrastructure providers, organizations will need to ensure that they have comprehensive security frameworks in place that will help them detect and respond to sophisticated, long-term intrusions before they can compromise sensitive systems and intellectual property.

Global Current News

ยฉ 2025 by Global Current News

  • Contact
  • Legal notice

No Result
View All Result
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Data & Analytics
  • Cybersecurity
  • Public Safety

ยฉ 2025 by Global Current News