F5 BIG-IP Source Code and Vulnerability Information Stolen in Cyberattack
Summary
Hide ▲
Show ▼
F5 has released security updates to address 44 vulnerabilities, including those stolen in a breach detected on August 9, 2025. The company has not found evidence that the stolen information has been used in actual attacks or disclosed publicly. The breach was attributed to a highly sophisticated nation-state threat actor, and F5 has taken extensive actions to contain the threat. F5's BIG-IP is a critical product used in application delivery networking and traffic management by many large enterprises. The company has 23,000 customers in 170 countries, including 48 of the Fortune 50 entities. The breach did not compromise F5's software supply chain or result in suspicious code modifications. The company has validated the safety of BIG-IP releases through multiple independent reviews by leading cybersecurity firms and has advised users to apply the latest updates for BIG-IP and related products. The breach involved a nation-state threat actor gaining persistent, long-term access to F5's product development environment and engineering knowledge management platforms. F5 disclosed the breach on October 15, 2025, confirming that the attack was detected in August 2025. The threat actor exfiltrated files containing BIG-IP source code and information regarding undisclosed vulnerabilities. F5 has not found evidence of access to or exfiltration of data tied to its CRM, financial, support case management, or iHealth systems, nor the NGINX source code or product development environment. F5 has identified no evidence of modification to its software supply chain, including source code, build pipeline, and release pipeline. F5 has worked with multiple incident response firms and law enforcement to mitigate the event and believes it has contained the threat. F5 has rotated credentials, strengthened access controls, deployed improved inventory and patch management automation, integrated better monitoring and detection tools, and implemented enhancements to network security infrastructure. F5 advises customers to apply the latest BIG-IP updates and has shared guidance for hardening customers' systems. On October 15, 2025, CISA directed federal civilian executive branch (FCEB) agencies to inventory F5 BIG-IP products and apply updates where necessary. The US government has urged federal agencies to take immediate action after F5 revealed it had been breached by a nation-state actor. The US Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive demanding that federal agencies evaluate if the networked management interfaces are accessible from the public internet and apply updates from F5. CISA warned that the threat actor's access to the F5 development environment could enable it to conduct static and dynamic analysis to discover logical flaws, zero-day vulnerabilities, and targeted exploits. The Justice Department ordered a delay in public disclosure of the breach on September 12, 2025. F5 has improved internal security including access controls, inventory and patch management, network security, and monitoring of all software development platforms. Tom Kelermann, VP of cyber risk at Hitrust, argued that the F5 breach is likely to be the first stage in a supply chain campaign. Ilia Kolochenko, CEO of ImmuniWeb, agreed that the stolen IP could be used to craft zero-day exploits for subsequent APT campaigns.
Timeline
-
15.10.2025 21:01 2 articles · 1d ago
F5 releases patches for stolen BIG-IP vulnerabilities
F5 has released security updates to address 44 vulnerabilities, including those stolen in the breach. The updates include patches for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients. F5 has also issued guidance to secure F5 environments and advised customers to update their systems immediately. CISA has ordered federal agencies to apply the latest F5 security updates by October 31, 2025, and to decommission public-facing F5 devices that have reached end-of-support.
Show sources
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
15.10.2025 16:32 6 articles · 1d ago
F5 discloses cyberattack resulting in theft of BIG-IP source code and vulnerabilities
The breach involved a nation-state threat actor gaining persistent, long-term access to F5's product development environment and engineering knowledge management platforms. The threat actor exfiltrated files containing BIG-IP source code and information regarding undisclosed vulnerabilities. F5 has not found evidence of access to or exfiltration of data tied to its CRM, financial, support case management, or iHealth systems, nor the NGINX source code or product development environment. F5 has identified no evidence of modification to its software supply chain, including source code, build pipeline, and release pipeline. F5 has worked with multiple incident response firms and law enforcement to mitigate the event and believes it has contained the threat. F5 has rotated credentials, strengthened access controls, deployed improved inventory and patch management automation, integrated better monitoring and detection tools, and implemented enhancements to network security infrastructure. F5 advises customers to apply the latest BIG-IP updates and has shared guidance for hardening customers' systems. On October 15, 2025, CISA directed federal civilian executive branch (FCEB) agencies to inventory F5 BIG-IP products and apply updates where necessary. The US government has urged federal agencies to take immediate action after F5 revealed it had been breached by a nation-state actor. The US Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive demanding that federal agencies evaluate if the networked management interfaces are accessible from the public internet and apply updates from F5. CISA warned that the threat actor's access to the F5 development environment could enable it to conduct static and dynamic analysis to discover logical flaws, zero-day vulnerabilities, and targeted exploits. The Justice Department ordered a delay in public disclosure of the breach on September 12, 2025. F5 has improved internal security including access controls, inventory and patch management, network security, and monitoring of all software development platforms. Tom Kelermann, VP of cyber risk at Hitrust, argued that the F5 breach is likely to be the first stage in a supply chain campaign. Ilia Kolochenko, CEO of ImmuniWeb, agreed that the stolen IP could be used to craft zero-day exploits for subsequent APT campaigns.
Show sources
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
Information Snippets
-
F5 detected a cyberattack on August 9, 2025, where attackers had long-term access to its systems.
First reported: 15.10.2025 16:324 sources, 6 articlesShow sources
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
The attackers stole source code, vulnerability information, and some configuration details for a limited number of customers.
First reported: 15.10.2025 16:324 sources, 6 articlesShow sources
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 has not found evidence of the stolen information being used in attacks or disclosed publicly.
First reported: 15.10.2025 16:324 sources, 6 articlesShow sources
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
The breach did not compromise F5's software supply chain or result in suspicious code modifications.
First reported: 15.10.2025 16:324 sources, 6 articlesShow sources
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 is reviewing which customers had their configuration or implementation details stolen.
First reported: 15.10.2025 16:324 sources, 5 articlesShow sources
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
The U.S. Department of Justice requested a delay in public disclosure of the incident.
First reported: 15.10.2025 16:322 sources, 3 articlesShow sources
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 claims the incident has no material impact on its operations, and all services remain available and safe.
First reported: 15.10.2025 16:322 sources, 3 articlesShow sources
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 has validated the safety of BIG-IP releases through multiple independent reviews by leading cybersecurity firms.
First reported: 15.10.2025 16:323 sources, 4 articlesShow sources
- F5 says hackers stole undisclosed BIG-IP flaws, source code — www.bleepingcomputer.com — 15.10.2025 16:32
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 attributed the breach to a highly sophisticated nation-state threat actor.
First reported: 15.10.2025 19:062 sources, 2 articlesShow sources
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 has not seen any new unauthorized activity since beginning containment efforts.
First reported: 15.10.2025 19:063 sources, 3 articlesShow sources
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
The attackers did not access F5's CRM, financial, support case management, or iHealth systems.
First reported: 15.10.2025 19:064 sources, 4 articlesShow sources
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 engaged Google Mandiant and CrowdStrike for incident response.
First reported: 15.10.2025 19:064 sources, 4 articlesShow sources
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 rotated credentials, strengthened access controls, and deployed new monitoring tools.
First reported: 15.10.2025 19:064 sources, 4 articlesShow sources
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 bolstered its product development environment and network security architecture.
First reported: 15.10.2025 19:064 sources, 4 articlesShow sources
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
Users are advised to apply the latest updates for BIG-IP and related products.
First reported: 15.10.2025 19:064 sources, 4 articlesShow sources
- F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion — thehackernews.com — 15.10.2025 19:06
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 released security updates addressing 44 vulnerabilities, including those stolen in the breach.
First reported: 15.10.2025 21:013 sources, 3 articlesShow sources
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 issued guidance to secure F5 environments from cyberattacks, including enabling BIG-IP event streaming and configuring remote syslog servers.
First reported: 15.10.2025 21:013 sources, 3 articlesShow sources
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
CISA ordered Federal Civilian Executive Branch (FCEB) agencies to apply the latest F5 security updates by October 31, 2025.
First reported: 15.10.2025 21:013 sources, 3 articlesShow sources
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
CISA instructed federal agencies to disconnect and decommission all public-facing F5 devices that have reached end-of-support.
First reported: 15.10.2025 21:013 sources, 3 articlesShow sources
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
Successful exploitation of vulnerable BIG-IP appliances can allow attackers to steal credentials and API keys, move laterally within targets' networks, steal sensitive data, and establish persistence on compromised devices.
First reported: 15.10.2025 21:012 sources, 2 articlesShow sources
- F5 releases BIG-IP patches for stolen security vulnerabilities — www.bleepingcomputer.com — 15.10.2025 21:01
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
The breach involved a nation-state threat actor gaining persistent, long-term access to F5's product development environment and engineering knowledge management platforms.
First reported: 15.10.2025 22:082 sources, 2 articlesShow sources
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 disclosed the breach on October 15, 2025, confirming that the attack was detected in August 2025.
First reported: 15.10.2025 22:082 sources, 2 articlesShow sources
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
The threat actor exfiltrated files containing BIG-IP source code and information regarding undisclosed vulnerabilities.
First reported: 15.10.2025 22:082 sources, 2 articlesShow sources
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 has not found evidence of access to or exfiltration of data tied to its CRM, financial, support case management, or iHealth systems, nor the NGINX source code or product development environment.
First reported: 15.10.2025 22:082 sources, 2 articlesShow sources
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 has identified no evidence of modification to its software supply chain, including source code, build pipeline, and release pipeline.
First reported: 15.10.2025 22:082 sources, 2 articlesShow sources
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 has worked with multiple incident response firms and law enforcement to mitigate the event and believes it has contained the threat.
First reported: 15.10.2025 22:082 sources, 2 articlesShow sources
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 has rotated credentials, strengthened access controls, deployed improved inventory and patch management automation, integrated better monitoring and detection tools, and implemented enhancements to network security infrastructure.
First reported: 15.10.2025 22:082 sources, 2 articlesShow sources
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 advises customers to apply the latest BIG-IP updates and has shared guidance for hardening customers' systems.
First reported: 15.10.2025 22:082 sources, 2 articlesShow sources
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
On October 15, 2025, CISA directed federal civilian executive branch (FCEB) agencies to inventory F5 BIG-IP products and apply updates where necessary.
First reported: 15.10.2025 22:082 sources, 2 articlesShow sources
- F5 BIG-IP Environment Breached by Nation-State Actor — www.darkreading.com — 15.10.2025 22:08
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
The US government has urged federal agencies to take immediate action after F5 revealed it had been breached by a nation-state actor.
First reported: 16.10.2025 11:391 source, 1 articleShow sources
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
The US Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive demanding that federal agencies evaluate if the networked management interfaces are accessible from the public internet and apply updates from F5.
First reported: 16.10.2025 11:391 source, 1 articleShow sources
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
CISA warned that the threat actor's access to the F5 development environment could enable it to conduct static and dynamic analysis to discover logical flaws, zero-day vulnerabilities, and targeted exploits.
First reported: 16.10.2025 11:391 source, 1 articleShow sources
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
CISA stated that successful exploitation of the impacted F5 products could enable a threat actor to access embedded credentials and API keys, move laterally within an organization’s network, exfiltrate data, and establish persistent system access.
First reported: 16.10.2025 11:391 source, 1 articleShow sources
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
The Justice Department ordered a delay in public disclosure of the breach on September 12, 2025.
First reported: 16.10.2025 11:391 source, 1 articleShow sources
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
F5 has improved internal security including access controls, inventory and patch management, network security, and monitoring of all software development platforms.
First reported: 16.10.2025 11:391 source, 1 articleShow sources
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
Tom Kelermann, VP of cyber risk at Hitrust, argued that the F5 breach is likely to be the first stage in a supply chain campaign.
First reported: 16.10.2025 11:391 source, 1 articleShow sources
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
-
Ilia Kolochenko, CEO of ImmuniWeb, agreed that the stolen IP could be used to craft zero-day exploits for subsequent APT campaigns.
First reported: 16.10.2025 11:391 source, 1 articleShow sources
- F5 Reveals Nation State Breach and Urges Immediate Patching — www.infosecurity-magazine.com — 16.10.2025 11:39
Similar Happenings
F5 Devices Targeted by Nation-State Actors; CISA Issues Emergency Directive
A nation-state threat actor is exploiting vulnerabilities in F5 devices and software to gain unauthorized access to federal networks. The actor can exfiltrate sensitive data and establish persistent access. CISA has issued Emergency Directive 26-01 to mitigate the risk, requiring immediate updates to F5 products. The directive affects all Federal Civilian Executive Branch (FCEB) agencies. The directive follows F5's disclosure of a breach in their development environment, where the actor had long-term access and exfiltrated files. The vulnerability poses a significant risk to any organization using F5 technology.
Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 183 flaws
Microsoft's October 2025 Patch Tuesday marks the end of free security updates for Windows 10, with the release of the final cumulative update KB5066791. This update addresses 183 vulnerabilities, including six zero-day flaws, and is mandatory for all Windows 10 users. Extended Security Updates (ESU) are available for purchase for up to three years for enterprise users and one year for consumers. The patches cover a range of vulnerabilities, including critical remote code execution and elevation of privilege issues. The zero-day vulnerabilities affect various components, such as Windows SMB Server, Microsoft SQL Server, Windows Agere Modem Driver, Windows Remote Access Connection Manager, AMD EPYC processors, and TCG TPM 2.0. Some of these flaws have been publicly disclosed or actively exploited. The update also includes fixes for vulnerabilities in third-party components, such as IGEL OS and AMD EPYC processors. Additionally, Microsoft Office users should be aware of CVE-2025-59227 and CVE-2025-59234, which exploit the Preview Pane. The update is the largest on record for Microsoft, with 183 CVEs, pushing the number of unique vulnerabilities released so far this year to more than 1,021. The update includes fixes for a wide range of vulnerabilities, including remote code execution (RCE), elevation of privilege, data theft, denial of service (DoS), and security feature bypass issues. The update also marks the end of life for Windows 10, meaning Microsoft will no longer issue regular patches for vulnerabilities in the operating system as part of its regular Patch Tuesday updates. Exchange Server 2016, Exchange Server 2019, Skype for Business 2016, Windows 11 IoT Enterprise Version 22H2, and Outlook 2016 are also reaching end-of-life. Windows 10 users can opt for Extended Security Updates (ESU) for one year at a cost of $30, or install Linux as an alternative. Linux Mint is recommended for Windows 10 users transitioning to Linux, with compatibility for most computers from the last decade.
Discord User Data Compromised in Third-Party Breach
Hackers claim to have stolen data from 5.5 million unique Discord users after compromising a third-party customer service provider. The attack occurred on September 20, 2025, affecting users who interacted with Discord’s customer support and/or Trust and Safety teams. The breach appears to be financially motivated, with hackers demanding a ransom. The Scattered Lapsus$ Hunters (SLH) threat group claimed responsibility for the attack, stating they breached a Zendesk instance used by Discord for customer support. The compromised data includes real names, usernames, email addresses, contact details, IP addresses, messages, attachments, photos of government-issued identification documents, partial billing information, and purchase history. Discord took immediate action to isolate the support provider from its ticketing system and launched an investigation with the help of a forensics firm and law enforcement. The hackers also accessed corporate data, including training materials and internal presentations. Discord has notified law enforcement and relevant data protection authorities about the incident. No full credit card numbers, CVV codes, passwords, or authentication data were compromised. Additionally, no messages or activity on Discord outside of communication with customer support were obtained by the attackers.
Rhadamanthys Stealer Adds Device Fingerprinting, PNG Steganography Payloads
Rhadamanthys Stealer, a popular information stealer, has been updated to include device and web browser fingerprinting capabilities. The malware now uses PNG steganography to conceal its payloads. The threat actor behind Rhadamanthys has also advertised two additional tools, Elysium Proxy Bot and Crypt Service, on their website. The stealer's current version is 0.9.2, and it is available under a malware-as-a-service (MaaS) model with tiered pricing packages. The threat actor has rebranded themselves as "RHAD security" and "Mythical Origin Labs," indicating a long-term business venture. The stealer's capabilities have evolved significantly, posing a comprehensive threat to personal and corporate security. The latest updates include enhanced obfuscation techniques, environment checks, and a Lua runner for additional plugins.
Renault and Dacia UK Customers Affected by Third-Party Data Breach
Renault and Dacia UK customers have been notified of a data breach affecting personal information shared with a third-party provider. The breach exposed full names, gender, phone numbers, email addresses, postal addresses, vehicle identification numbers, and vehicle registration numbers. The third-party provider has isolated the incident and removed the threat from its networks. The affected customers are advised to be vigilant against potential phishing and social engineering attacks. The number of impacted customers and the identity of the third-party provider have not been disclosed. The breach follows a significant cyberattack at Jaguar Land Rover in the UK, which disrupted operations for nearly a month, and is part of a string of breaches in the transport sector, impacting JLR, Collins Aerospace, and LNER.