Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

F5 Customer Information Accessed By Threat Actor

CRN by CRN
October 15, 2025
Home News
Share on FacebookShare on Twitter


‘The Company is currently reviewing the contents of these files and will communicate with affected customers directly as appropriate,’ F5 said.

A nation-state-affiliated threat actor that gained unauthorized access to F5 systems exfiltrated source code for its BIG-IP application delivery and security products plus files with customer configuration or implementation information.

The Seattle-based security vendor disclosed Wednesday in a regulatory filing and a post on its website that the configuration or implementation information was “for a small percentage of customers” and came from its knowledge management platform. The threat actor had “long-term, persistent access to” the BIG-IP development environment and engineering knowledge management platform.

“The Company is currently reviewing the contents of these files and will communicate with affected customers directly as appropriate,” F5 said in a filing with the U.S. Securities and Exchange Commission (SEC). “As of the date of this disclosure, this incident has not had a material impact on the Company’s operations, and the Company is evaluating the impact this incident may reasonably have on its financial condition or results of operations.”

[RELATED: Salesforce Confirms It Won’t ‘Engage, Negotiate With, Or Pay’ Threat Actors]

F5 BIG-IP Breach

CRN has reached out to F5 for comment.

The vendor’s top channel goals for 2025 include increasing partners’ customer satisfaction ratings, according to CRN’s 2025 Channel Chiefs.

The disclosure comes in the days leading to F5’s fourth fiscal quarter earnings report, which is set for Oct. 27.

The SEC filing notes that on Sept 12, the U.S. Department of Justice allowed F5 to delay public disclosure of the breach.

Although none of the public posts about the breach name the country the threat actor is affiliated with, notably cybersecurity consulting company Sygnia published a report in June 2024 that pointed to a group, Velvet Ant, that appeared to be affiliated with China and had targeted a legacy F5 BIG-IP appliance in a cyberattack on an unnamed large organization in late 2023.

On Wednesday, the U.S. Cybersecurity and Infrastructure Security Agency published a bulletin online directing Federal Civilian Executive Branch (FCEB) agencies to inventory BIG-IP products, evaluate if the networked management interfaces are accessible from the public internet, and update the products to avoid exploitation by “a nation-state affiliated cyber threat actor” that compromised F5’s systems.

“The threat actor’s access to F5’s proprietary source code could provide that threat actor with a technical advantage to exploit F5 devices and software,” according to the CISA bulletin. “The threat actor’s access could enable the ability to conduct static and dynamic analysis for identification of logical flaws and zero-day vulnerabilities as well as the ability to develop targeted exploits.”

CISA directed immediate emergency action for BIG-IP iSeries, rSeries and any other F5 hardware that has reached end of support. It also directed action for all devices running BIG-IP (F5OS), BIG-IP (TMOS), Virtual Edition (VE), BIG-IP Next, BIG-IQ, BIG-IP Next for Kubernetes (BNK and Cloud-Native Network Functions (CNF) software.

Agencies are to disconnect and decommission any F5 devices at end of support as part of the emergency actions.

Threat Actor Access Discovered In August

In F5’s SEC filing, the company said that it learned about the unauthorized access on Aug. 9 and, it believes, successfully contained the activity.

F5 has been working with CrowdStrike, Google subsidiary Mandiant, law enforcement and government partners since the discovery, according to a company statement Wednesday.

The vendor has not found evidence of exfiltrated data from its customer relationship management (CRM), financial, support case management or iHealth systems, according to F5.

The threat actor appears to have not accessed or modified NGINX source code or its product development environment, F5 Distributed Cloud Services systems or Silverline systems. NCC Group and IOActive have validated that no evidence exists of the threat actor modifying F5’s software supply chain.

F5’s recommendations to users include enabling BIG-IP event streaming to their security information and event management (SIEM) tool and updating BIG-IP software as soon as possible.

The vendor has rotated credentials and strengthened access controls across its systems, deployed improved inventory and patch management automation and enhanced its network security architecture among other improvements since discovering the unauthorized access, according to F5.

It continues to review code and test products with NCC Group and IOActive. It has extended the CrowdStrike Falcon endpoint detection and response (EDR) and Overwatch Threat Hunting products to BIG-IP for additional visibility and defense strengthening. F5 will give BIG-IP customers an early access version to the products and give supported customers a free CrowdStrike Falcon EDR subscription, according to the company’s online post about the security incident.

F5 notably discovered the unauthorized access days before revealing plans to cut more than 100 employees amid changes in its product organization.

F5 partners and customers are also at the start of a device refresh period that should go into next year for its Viprion and iSeries products, according to a Morgan Stanley report earlier this month.

The vendor has also been on an acquisition spree, closing on Sept. 29 on its $180 million purchase of CalypsoAI. This year has also seen F5 acquisitions of Fletch and MantisNet.

Other vendor battles with threat actors spilling into the public eye in recent days include Avnet, Oracle, Salesforce and Cisco.



Source link

Tags: Application and Platform SecurityCloud PlatformsCloud SecurityCloud SoftwareCyberattacksCybersecurityData ProtectionEndpoint SecurityManaged SecurityManaged Security ServicesManaged Service Providersnetwork securitySecurity operationsThreat Intelligence SolutionsZero Trust Network Access (ZTNA)
CRN

CRN

Next Post
Banks chase AI-fueled efficiencies

Banks chase AI-fueled efficiencies

Recommended.

Huawei: Unterstützung von Netzbetreibern bei der Umgestaltung von Geschäft, Infrastruktur und O&M mit KI

Huawei: Unterstützung von Netzbetreibern bei der Umgestaltung von Geschäft, Infrastruktur und O&M mit KI

March 6, 2025
Help Desk Automation-Focused MSP Process Gears Up For Major Growth In 2025

Help Desk Automation-Focused MSP Process Gears Up For Major Growth In 2025

May 20, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio