Networking and application delivery solutions provider F5 Systems disclosed a cybersecurity incident in which state-sponsored attackers gained persistent access to some of its systems, including those related to its BIG-IP platform. The company revealed the breach in an SEC filing on Wednesday, noting that sensitive files, including source code and configuration data, were exfiltrated.
Scope of the Breach
According to F5 Systems, the attackers obtained some files from its engineering knowledge management platform, which contained configuration and implementation information for a small percentage of customers. The company is reviewing these files and will notify affected customers if necessary.
F5 Systems emphasized that there is no evidence of modification to its software supply chain, including source code, build pipelines, or release mechanisms. Additionally, the company confirmed that NGINX source code, Distributed Cloud Services, Silverline systems, CRM, financial data, iHealth, and support case management systems were not accessed by the attackers.
The firm stated that it is not aware of any undisclosed critical vulnerabilities or active exploitation of flaws. While some source code was exfiltrated, F5 Systems said the incident has not had a material impact on its operations, and it is still assessing potential effects on its financial condition or results of operations.
Timeline and Detection
F5 Systems detected the attack on August 9, 2025, and disclosure was delayed with permission from the U.S. Justice Department, as allowed for public companies under federal reporting regulations. Such delays are granted to prevent further compromise while the company investigates.
Potential Threat Actor
Although F5 did not explicitly name the attacker, the attack profile points to state-sponsored actors, with cybersecurity analysts noting patterns consistent with previous campaigns targeting software companies. These campaigns often aim to exfiltrate source code and discover zero-day vulnerabilities that could be used for future exploits.
Chinese state-sponsored threat actors have been linked to similar attacks in the past. For example, campaigns targeting SaaS providers, BIG-IP appliances, and Microsoft SharePoint servers reportedly focused on obtaining sensitive source code and vulnerability intelligence.
Industry Context
This incident highlights an ongoing trend in cybersecurity where critical software and technology companies are primary targets for attackers seeking high-value intellectual property. Source code and configuration files provide attackers with detailed insights into system architecture, potentially enabling future exploitation if not properly protected.
F5 Systems is taking steps to enhance its cybersecurity posture, reviewing affected systems, and coordinating with external security experts. The company has assured stakeholders that the breach does not indicate active compromise of customer systems or critical vulnerabilities that could be exploited remotely at this time.
Customer Impact and Next Steps
While the impact appears limited to internal systems, some customer configurations may have been exposed. F5 is proactively evaluating affected files and plans to notify any customers directly if needed.
The incident underscores the importance of robust security measures for companies handling sensitive software, particularly those providing platforms widely deployed in enterprise environments. Firms are increasingly expected to monitor for persistent threats, isolate compromised systems quickly, and provide timely disclosure to regulators and stakeholders.
F5 continues to investigate the breach, reinforce security protocols, and mitigate potential risks for both the company and its clients. The firm reassured customers and investors that there is currently no evidence of direct harm or active exploitation stemming from the attack.
Also Read: Capita Fined £14 Million After Data Breach Affects 6.6 Million People