Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

22 Fun Gifts for Babies (and Toddlers!)

17 October 2025

Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks

16 October 2025

Review: Proton Mail

16 October 2025
Facebook X (Twitter) Instagram
Just In
  • 22 Fun Gifts for Babies (and Toddlers!)
  • Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
  • Review: Proton Mail
  • Browser Fingerprinting: What Your Browser Is Telling Everyone About You
  • Should You Hike in Boots or Trail Runners?
  • 3D Ninja Gaiden And Dead Or Alive Creator Tomonobu Itagaki Dead At 58
  • Niantic’s Peridot, the Augmented Reality Alien Dog, Is Now a Talking Tour Guide
  • Quantic Dream Is Making Spellcasters Chronicles, A Multiplayer Game – Here’s What We Think So Far
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks
News

Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks

News RoomBy News Room16 October 20253 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

Thousands of networks—many of them operated by the US government and Fortune 500 companies—face an “imminent threat” of being breached by a nation-state hacking group following the breach of a major maker of software, the federal government warned on Wednesday.

F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a “sophisticated” threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a “long term.” Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network for years.

Unprecedented

During that time, F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world’s top 50 corporations. Wednesday’s disclosure went on to say the threat group downloaded proprietary BIG-IP source code information about vulnerabilities that had been privately discovered but not yet patched. The hackers also obtained configuration settings that some customers used inside their networks.

Control of the build system and access to the source code, customer configurations, and documentation of unpatched vulnerabilities has the potential to give the hackers unprecedented knowledge of weaknesses and the ability to exploit them in supply-chain attacks on thousands of networks, many of which are sensitive. The theft of customer configurations and other data further raises the risk that sensitive credentials can be abused, F5 and outside security experts said.

Customers position BIG-IP at the very edge of their networks for use as load balancers and firewalls, and for inspection and encryption of data passing into and out of networks. Given BIG-IP’s network position and its role in managing traffic for web servers, previous compromises have allowed adversaries to expand their access to other parts of an infected network.

F5 said that investigations by two outside intrusion-response firms have yet to find any evidence of supply-chain attacks. The company attached letters from firms IOActive and NCC Group attesting that analyses of source code and build pipeline uncovered no signs that a “threat actor modified or introduced any vulnerabilities into the in-scope items.” The firms also said they didn’t identify any evidence of critical vulnerabilities in the system. Investigators, which also included Mandiant and CrowdStrike, found no evidence that data from its CRM, financial, support case management, or health systems was accessed.

The company released updates for its BIG-IP, F5OS, BIG-IQ, and APM products. CVE designations and other details are here. Two days ago, F5 rotated BIG-IP signing certificates, though there was no immediate confirmation that the move is in response to the breach.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleReview: Proton Mail
Next Article 22 Fun Gifts for Babies (and Toddlers!)

Related Articles

News

22 Fun Gifts for Babies (and Toddlers!)

17 October 2025
News

Review: Proton Mail

16 October 2025
News

Browser Fingerprinting: What Your Browser Is Telling Everyone About You

16 October 2025
News

Should You Hike in Boots or Trail Runners?

16 October 2025
News

Niantic’s Peridot, the Augmented Reality Alien Dog, Is Now a Talking Tour Guide

16 October 2025
News

How ByteDance Made China’s Most Popular AI Chatbot

16 October 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024105 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

5 laptops to buy instead of the M4 MacBook Pro

17 November 202492 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
Gaming

3D Ninja Gaiden And Dead Or Alive Creator Tomonobu Itagaki Dead At 58

News Room16 October 2025
News

Niantic’s Peridot, the Augmented Reality Alien Dog, Is Now a Talking Tour Guide

News Room16 October 2025
Gaming

Quantic Dream Is Making Spellcasters Chronicles, A Multiplayer Game – Here’s What We Think So Far

News Room16 October 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025130 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 2024105 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

Browser Fingerprinting: What Your Browser Is Telling Everyone About You

16 October 2025

Should You Hike in Boots or Trail Runners?

16 October 2025

3D Ninja Gaiden And Dead Or Alive Creator Tomonobu Itagaki Dead At 58

16 October 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.