Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

F5 Reports Hackers Stole Source Code

October 16, 2025
Reading Time: 4 mins read
in Incidents

A recent security breach at F5, a prominent provider of security and application delivery solutions, has raised concerns about state-sponsored cyber espionage. In a filing with the SEC, the company revealed that hackers, believed to be linked to the Chinese government, gained persistent, long-term access to some of its systems. This intrusion reportedly targeted environments related to the development of F5’s flagship BIG-IP platform. The attackers successfully exfiltrated files, including BIG-IP source code and information on undisclosed vulnerabilities. Despite this, F5 asserts that it has no knowledge of any critical or remotely exploitable vulnerabilities and no evidence that the compromised flaws are being actively exploited. The company also confirmed that there were no modifications to its software supply chain, source code, or build and release pipelines.

The attackers’ access was extensive but appears to have been limited to specific areas. F5 reported that it has no evidence that the hackers accessed or altered the source code for its NGINX product, nor did they compromise its F5 Distributed Cloud Services or Silverline systems. Crucially, the company’s customer-facing and financial systems, such as its CRM, financial, iHealth, and support case management platforms, were also not breached. However, some files containing configuration and implementation data from an engineering knowledge management platform were exfiltrated. This data pertained to a small percentage of customers, and F5 is in the process of reviewing the information and will notify affected customers directly if necessary.

F5 detected the security incident on August 9 but delayed public disclosure at the request of the U.S. Justice Department. Publicly traded companies are legally required to disclose “material” cybersecurity incidents within four business days, but a delay can be granted under certain circumstances. F5’s filing indicates that it does not believe the incident has had a “material impact” on its operations, though it is still assessing the potential effects on its financial condition. The company has not officially named the perpetrators, but the nature of the attack, particularly the focus on stealing source code and hunting for zero-day vulnerabilities, is consistent with tactics used by Chinese state-sponsored threat actors.

The targeting of major software companies for intellectual property and vulnerability information is a well-established pattern for Chinese cyber espionage. For example, following the recent ToolShell attacks, Microsoft reportedly launched an investigation to determine if Chinese state-sponsored groups had obtained information about exploited SharePoint vulnerabilities. Similarly, a recent report from Google’s Threat Intelligence Group and Mandiant highlighted a campaign by Chinese cyberspies targeting the software-as-a-service (SaaS) and technology industries, with a primary objective of stealing source code to analyze for zero-day flaws. This strategic targeting allows them to discover and exploit vulnerabilities before they are widely known.

Furthermore, Chinese hackers have a history of targeting F5’s BIG-IP appliances in their attacks. The combination of a focus on source code theft, a known history of targeting the company’s products, and the attackers’ long-term persistence within the network strongly points toward China as the likely perpetrator. This incident serves as a stark reminder of the sophisticated and persistent threats faced by technology companies from nation-state actors seeking to gain a strategic advantage through cyber means.

Reference:

  • F5 Confirms Nation State Hackers Stole Source Code And Security Vulnerability Data
Tags: cyber incidentsCyber Incidents 2025Cyber threatsOctober 2025
ADVERTISEMENT

Related Posts

YouTube Down Globally With Playback Errors

October 16, 2025

Spanish Retailer Mango Discloses Breach

October 16, 2025
Unencrypted Satellites Expose Data

Unencrypted Satellites Expose Data

October 15, 2025
Unencrypted Satellites Expose Data

Microsoft Investigates 365 App Outage

October 15, 2025
Unencrypted Satellites Expose Data

Sonicwall VPN Accounts Breached

October 15, 2025
Multi Country Botnet Hits RDP Services

SimonMed Imaging Reports Data Breach

October 14, 2025

Latest Alerts

Fortinet And Ivanti Patch Severe Flaws

Malicious VSCode Extensions Steal Crypto

Fake Password Manager Hijack PCs

Android Flaw Lets Apps Steal 2FA Codes

New Sap Netweaver Bug Enables Takeover

Two New Windows Zero Days Exploited

Subscribe to our newsletter

    Latest Incidents

    F5 Reports Hackers Stole Source Code

    YouTube Down Globally With Playback Errors

    Spanish Retailer Mango Discloses Breach

    Unencrypted Satellites Expose Data

    Sonicwall VPN Accounts Breached

    Microsoft Investigates 365 App Outage

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial