Nation-State Hackers Pilfer F5 Source Code, CISA Issues Urgent Warning
- Dean Charlton

- Oct 16, 2025
- 2 min read
The digital landscape has been rattled by a significant cybersecurity incident, as a nation-state-affiliated threat actor has successfully breached F5, a prominent technology company, and stolen sensitive data, including portions of its BIG-IP source code. This alarming development has prompted the US Cybersecurity and Infrastructure Security Agency (CISA) to issue an emergency directive, urging federal agencies to take immediate action to secure their networks.

CISA’s directive, ED 26-01, highlights the severe implications of this breach. With access to F5's source code and vulnerability information, the attackers are now in a prime position to scrutinise F5’s products, potentially uncover previously unknown "zero-day" vulnerabilities, and subsequently develop sophisticated exploits and malware. CISA explicitly labeled this as an “imminent threat to federal networks” that rely on F5’s solutions. The potential consequences are grave, ranging from the compromise of API keys and data exfiltration to the complete takeover of targeted systems.
In response, CISA has mandated that Federal Civilian Executive Branch (FCEB) agencies immediately inventory and patch or harden all F5 devices in their infrastructure. This includes BIG-IP iSeries, rSeries, and other F5 devices, particularly those that have reached end-of-support. The directive also extends to all devices running BIG-IP (F5OS), BIG–UP (TMOS), Virtual Edition (VE), BIG-IP Next, BIG-IQ, and BIG-IP Next for Kubernetes (BNK)/Cloud-Native Network Functions (CNF). CISA emphasised that these requirements are crucial for addressing immediate risks and preparing agencies for anticipated targeting of these devices by the threat actor.
While the identity of the nation-state behind the attack remains undisclosed, F5 has confirmed the breach in a recent SEC filing. The company acknowledged that files from its development environment were exfiltrated, encompassing parts of the BIG-IP source code and internal vulnerability data pertaining to as-yet unpatched issues. However, F5 has sought to reassure users by stating that no critical or remotely exploitable vulnerabilities were among the stolen files, and crucially, there is no current evidence of the stolen information being exploited in real-world attacks. Despite this, the theft of source code remains a serious concern, demanding a swift and comprehensive response from organisations utilising F5 products.


Comments