
In August 2025, cybersecurity company F5 Networks disclosed a significant breach by a highly sophisticated nation-state threat actor who gained and maintained long-term persistent access to F5’s internal systems, including the BIG-IP product development environment and engineering knowledge management platforms.
Key Details of the F5 Breach:
- Scope of Access: The attackers accessed files containing portions of BIG-IP source code and information about undisclosed security vulnerabilities for which patches were still in development.
- Duration: The breach was discovered on August 9, 2025, but the exact start of the intrusion was not disclosed. The attackers had persistent access for an extended period.
- Data Exfiltrated: Alongside source code and vulnerability details, some stolen files contained configuration and implementation details related to a small percentage of F5 customers.
- Systems Not Impacted: Customer CRM, financial, support case management, and iHealth systems were not accessed.
- Exploitation: No evidence was found that the stolen vulnerabilities had been used for active exploitation in the wild, and there were no indications that source code or development environments were modified or tampered with.
- Mitigation Efforts: F5 engaged external cybersecurity experts (Mandiant, CrowdStrike, NCC Group, IOActive), rotated credentials, strengthened access controls, enhanced network security architecture, and urged customers to promptly apply security patches for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients.
Risk and Impact:
The stolen source code and vulnerability information could be leveraged by adversaries to develop new exploits against F5 products, posing a potential risk to enterprise and government customers relying on BIG-IP and related products. The U.S. Department of Justice allowed F5 to delay public disclosure due to national security concerns associated with the incident.
Recommendations:
- Immediate application of patches released by F5 addressing the vulnerabilities exposed in the breach.
- Enhanced monitoring and detection for unusual lateral movement or suspicious activity within customer networks using affected F5 products.
- Review and tighten security configurations on BIG-IP and associated F5 products in enterprise deployments.
This breach underscores the escalating risk of supply chain and product development environment compromises by nation-state actors targeting critical cybersecurity infrastructure providers.




Useful information.
Pingback: Inside the F5 BIG-IP 2025 Security Incident: Source Code Theft and Urgent Patch Release – TheCyberThrone