A sophisticated nation-state actor breached F5 systems, stealing BIG-IP source code and data on undisclosed flaw
好的,我现在需要帮用户总结一篇文章,控制在100字以内。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是F5公司在2025年8月被一个国家支持的黑客组织入侵,窃取了BIG-IP的源代码和未公开漏洞的数据。攻击者进入了他们的开发和工程系统,但F5及时控制了威胁,没有进一步的活动。他们已经通知执法部门,并与 CrowdStrike 和 Mandiant 等安全公司合作调查。此外,F5没有发现CRM、财务或云系统的漏洞,也没有供应链被篡改的迹象。他们正在采取措施加强安全,并建议用户安装最新更新。 接下来,我需要将这些信息浓缩到100字以内。重点包括:F5被国家支持的黑客入侵、窃取源代码和漏洞数据、成功控制威胁、未发现供应链问题、已采取安全措施并建议用户更新。 现在组织语言,确保简洁明了。避免使用“这篇文章”或“内容总结”这样的开头,直接描述事件。 </think> F5披露遭国家支持的黑客入侵,窃取BIG-IP源代码及未公开漏洞数据。攻击者访问开发系统后被成功遏制,未发现供应链或客户系统受损。F5已采取安全措施并建议用户更新软件以应对潜在风险。 2025-10-15 18:27:16 Author: securityaffairs.com(查看原文) 阅读量:10 收藏

A sophisticated nation-state actor breached F5 systems, stealing BIG-IP source code and data on undisclosed flaw

F5 disclosed that a sophisticated nation-state actor breached its systems, stealing BIG-IP source code and data on undisclosed product vulnerabilities.

Cybersecurity firm F5 disclosed that a highly sophisticated nation-state actor in August 2025 threat actors breached its systems and stole BIG-IP’s source code and information related to undisclosed vulnerabilities.

The attackers accessed the company’s BIG-IP development and engineering systems, but F5 highlights that containment efforts were successful, with no further unauthorized activity observed.

The company reported the incident to law enforcement and is investigating the security breach with the help of leading cybersecurity firms.

“In August 2025, we learned a highly sophisticated nation-state threat actor maintained long-term, persistent access to, and downloaded files from, certain F5 systems. These systems included our BIG-IP product development environment and engineering knowledge management platforms. We have taken extensive actions to contain the threat actor. Since beginning these activities, we have not seen any new unauthorized activity, and we believe our containment efforts have been successful.” reads the notice of the Security Incident published by the company.

“In response to this incident, we are taking proactive measures to protect our customers and strengthen the security posture of our enterprise and product environments. We have engaged CrowdStrike, Mandiant, and other leading cybersecurity experts to support this work, and we are actively engaged with law enforcement and our government partners.”

F5 found no signs of compromise in its CRM, financial, or cloud systems, nor tampering with its source code or supply chain. The company states that some stolen files contained limited customer configuration data. The cybersecurity firm is notifying impacted clients.

“We have no evidence of modification to our software supply chain, including our source code and our build and release pipelines. This assessment has been validated through independent reviews by leading cybersecurity research firms NCC Group and IOActive.” continues the notice. “We have no evidence that the threat actor accessed or modified the NGINX source code or product development environment, nor do we have evidence they accessed or modified our F5 Distributed Cloud Services or Silverline systems.”

The company also filed a Form 8-K report with the U.S. Securities and Exchange Commission (SEC).

“On August 9, 2025, F5, Inc. (the “Company”, “F5”, “we”, or “our”) learned that a highly sophisticated nation-state threat actor had gained unauthorized access to certain Company systems. The Company promptly activated its incident response processes, and has taken extensive actions to contain the threat actor. To support these activities, the Company engaged leading external cybersecurity experts.” reads the report.

F5 responded to the breach with extensive containment and hardening measures to protect its systems and customers. The company rotated credentials, tightened access controls, automated patch management, and improved monitoring and network security.

The cybersecurity firm also enhanced protections in its product development environment and continues in-depth code reviews and penetration tests with NCC Group and IOActive. Additionally, F5 partnered with CrowdStrike to deploy Falcon EDR and threat hunting for BIG-IP, offering customers a free EDR subscription to bolster defenses.

Users should promptly install the latest updates for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients to ensure full protection.

Cybersecurity agencies UK’s NCSC and US CISA advise F5 customers to locate all F5 products, secure exposed management interfaces, and assess for compromise. F5 delayed disclosure at the U.S. government’s request to protect critical systems.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, security breach)




文章来源: https://securityaffairs.com/183436/security/a-sophisticated-nation-state-actor-breached-f5-systems-stealing-big-ip-source-code-and-data-on-undisclosed-flaw.html
如有侵权请联系:admin#unsafe.sh