Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

    October 16, 2025

    CISOs brace for an “AI vs. AI” fight

    October 16, 2025

    How emerging Mubadala-backed AAF is winning VC deals in some of the hottest startups

    October 16, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
    • CISOs brace for an “AI vs. AI” fight
    • How emerging Mubadala-backed AAF is winning VC deals in some of the hottest startups
    • Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
    • Last 48 hours to save before the Disrupt 2025 flash sale ends
    • Is a $300 Windows laptop worth buying? This Acer model gave me a resounding yes
    • How a headphone site operator built loyalty startup Lantern to solve his own problems
    • North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Security»Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
    Security

    Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks

    TechurzBy TechurzOctober 16, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Thousands of networks—many of them operated by the US government and Fortune 500 companies—face an “imminent threat” of being breached by a nation-state hacking group following the breach of a major maker of software, the federal government warned Wednesday.

    F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a “sophisticated” threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a “long-term.” Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network for years.

    Unprecedented

    During that time, F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world’s top 50 corporations. Wednesday’s disclosure went on to say the threat group downloaded proprietary BIG-IP source code information about vulnerabilities that had been privately discovered but not yet patched. The hackers also obtained configuration settings that some customers used inside their networks.

    Control of the build system and access to the source code, customer configurations, and documentation of unpatched vulnerabilities has the potential to give the hackers unprecedented knowledge of weaknesses and the ability to exploit them in supply-chain attacks on thousands of networks, many of which are sensitive. The theft of customer configurations and other data further raises the risk that sensitive credentials can be abused, F5 and outside security experts said.

    Customers position BIG-IP at the very edge of their networks for use as load balancers and firewalls, and for inspection and encryption of data passing into and out of networks. Given BIG-IP’s network position and its role in managing traffic for web servers, previous compromises have allowed adversaries to expand their access to other parts of an infected network.

    F5 said that investigations by two outside intrusion-response firms have yet to find any evidence of supply-chain attacks. The company attached letters from firms IOActive and NCC Group attesting that analyses of source code and build pipeline uncovered no signs that a “threat actor modified or introduced any vulnerabilities into the in-scope items.” The firms also said they didn’t identify any evidence of critical vulnerabilities in the system. Investigators, which also included Mandiant and CrowdStrike, found no evidence that data from its CRM, financial, support case management, or health systems was accessed.

    The company released updates for its BIG-IP, F5OS, BIG-IQ, and APM products. CVE designations and other details are here. Two days ago, F5 rotated BIG-IP signing certificates, though there was no immediate confirmation that the move is in response to the breach.

    created hack Imminent networks Thousands threat
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleLast 48 hours to save before the Disrupt 2025 flash sale ends
    Next Article How emerging Mubadala-backed AAF is winning VC deals in some of the hottest startups
    Techurz
    • Website

    Related Posts

    Security

    Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

    October 16, 2025
    Security

    CISOs brace for an “AI vs. AI” fight

    October 16, 2025
    Security

    Is a $300 Windows laptop worth buying? This Acer model gave me a resounding yes

    October 16, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

    October 16, 2025

    CISOs brace for an “AI vs. AI” fight

    October 16, 2025

    How emerging Mubadala-backed AAF is winning VC deals in some of the hottest startups

    October 16, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.