The company says containment actions have been successful and that no further unauthorized activity has been observed since its response began in August 2025. F5 has issued security updates across multiple product lines and urged customers to patch immediately.
According to F5, the threat actor downloaded files that included portions of BIG-IP source code and information about undisclosed vulnerabilities under development.
The company emphasized it has no knowledge of undisclosed critical or remote code execution flaws and is not aware of any active exploitation tied to those vulnerabilities.
Key findings from F5’s investigation:
F5 also reported no evidence of access to or exfiltration from CRM, financial, support case management, or iHealth systems.
However, some exfiltrated knowledge-base files contained configuration or implementation details for a small subset of customers; F5 is reviewing those and will notify impacted organizations directly.
Notably, F5 states there is no evidence of supply chain manipulation affecting source code, build, or release pipelines, a position independently validated by NCC Group and IOActive.
The company further says there is no indication of access to NGINX source code or its product development environment, nor to F5 Distributed Cloud Services or Silverline systems.
F5 has released updates for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients, directing customers to apply the October 2025 Quarterly Security Notification releases as soon as possible.
The company is providing a threat hunting guide, refreshed hardening best practices, and automated hardening checks via the F5 iHealth Diagnostic Tool to help identify gaps and prioritize remediation.
Recommended security actions for F5 customers:
For visibility, F5 recommends enabling BIG-IP event streaming to SIEMs and following its syslog configuration and login monitoring guides to enhance alerting on administrator logins, failed authentications, and privilege or configuration changes.
F5 engaged CrowdStrike, Mandiant, and other experts, while coordinating with law enforcement and government partners.
Internally, it rotated credentials, tightened access controls, improved inventory and patch automation, enhanced network security architecture, and hardened software development platforms.
Externally, F5 is continuing code review and penetration testing with NCC Group and IOActive.
In a notable move, F5 is partnering with CrowdStrike to extend Falcon EDR sensors and OverWatch Threat Hunting to BIG-IP, offering an early access program and providing all supported customers a free Falcon EDR subscription.
F5 underscored its commitment to transparency and ongoing updates. While the incident exposed sensitive engineering information, the company’s current assessment points to successful containment, no supply chain compromise, and no evidence of critical undisclosed RCE flaws being exploited.
Customers are strongly advised to patch promptly, implement hardened configurations, and increase monitoring to reduce residual risk.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post F5 Hacked – Attackers Gain Complete Control and Downloaded Files From F5 Systems appeared first on Cyber Security News.
Welcome to the weekend, friends! While the rest of our team was checking out Samsung’s…
Peacock was the sole streaming service for the 2026 Winter Olympics and the Super Bowl…
Magic: The Gathering is a fantastic card game, but the Commander format has given it…
This article includes mild spoilers for the Rhodes Hill Chronic Care Center section of Resident…
The Xiaomi Tag is a bit larger than Apple’s second-gen AirTags. | Image: Xiaomi Xiaomi…
The Leitzphone has just launched internationally alongside a regular version of the 17 Ultra. Xiaomi…
This website uses cookies.