
Foreign adversaries have achieved long-term access to critical U.S. government infrastructure through a major cybersecurity breach, prompting emergency federal action as our national security hangs in the balance.
Story Highlights
- Nation-state attackers gained persistent access to F5’s source code and development systems for months.
- CISA issued emergency directive forcing all federal agencies to patch thousands of vulnerable devices by October 22.
- Justice Department delayed public disclosure for national security reasons, raising transparency concerns.
- Government shutdown complications highlight Biden administration’s weakened cybersecurity infrastructure.
Nation-State Attackers Compromise Critical Infrastructure Provider
The Cybersecurity and Infrastructure Security Agency issued Emergency Directive 26-01 on October 15, 2025, after discovering foreign threat actors maintained persistent access to F5’s internal development environments.
F5, a Seattle-based technology company, provides critical BIG-IP application delivery and security services used across thousands of federal networks.
The attackers gained unauthorized access to F5’s source code and engineering platforms, creating vulnerabilities that could allow credential theft and complete system takeover across government networks.
๐จ Nation-state threat actors have compromised F5โs systems & downloaded portions of its BIG-IP source codeโposing serious risk to FCEB agencies. Follow the guidance in Emergency Directive 26-01 immediately to protect systems from potential exploits. ๐ https://t.co/tQt68r8GLb pic.twitter.com/DVS3EyHerw
— Cybersecurity and Infrastructure Security Agency (@CISAgov) October 15, 2025
F5 first discovered the breach in August but did not immediately disclose when the attack began, suggesting the foreign actors may have maintained access for an extended period.
CISA Executive Assistant Director Nick Anderson warned that nation-state actors could exploit these flaws to gain unauthorized access to embedded credentials and API keys, creating “an unacceptable risk to federal networks.”
The breach represents a significant supply chain attack targeting the foundation of America’s digital infrastructure.
Emergency Response Reveals Government Vulnerabilities
The emergency directive requires federal civilian executive branch agencies, including the Departments of Justice, State, and Treasury, to inventory their F5 BIG-IP products and apply critical updates by October 22.
Agencies must evaluate whether their networks are accessible from the public internet and complete comprehensive scoping reports by October 29. Anderson confirmed thousands of F5 devices operate across federal networks, though CISA claims no current awareness of actual data breaches within federal agencies.
Cybersecurity order warns of "imminent risk" to federal agencies following possible breach https://t.co/diulUke79F
— CBSColorado (@CBSNewsColorado) October 15, 2025
Unit 42’s Chief Technology Officer Michael Sikorski explained the severity of the compromise, noting that attackers stole information about undisclosed vulnerabilities F5 was actively patching.
This provides threat actors the ability to exploit vulnerabilities with no public patches available, dramatically increasing the speed of potential attacks.
The stolen source code allows rapid identification of exploitable issues, giving foreign adversaries a significant advantage in targeting American government systems.
Biden Administration’s Failed Cybersecurity Legacy Exposed
The Justice Department intervened on September 12 to delay F5’s public disclosure, citing national security concerns under SEC cybersecurity rules adopted in July 2023.
This represents one of the first acknowledged instances of DOJ intervention in corporate cybersecurity disclosures, raising questions about transparency and the government’s role in managing private sector breach notifications.
The four-day disclosure requirement was suspended to prevent substantial risk to national security or public safety.
CISA Acting Director Madhu Gottumukkala acknowledged the agency’s challenges amid ongoing government shutdowns and the lapse of the Cybersecurity Information Sharing Act of 2015.
The expired legislation previously governed federal-private sector cyber information sharing, creating coordination gaps during critical security incidents.
Anderson admitted the agency faces staffing reductions and furloughs but claimed essential functions remain operational, highlighting the fragile state of America’s cybersecurity infrastructure under the outgoing administration’s mismanagement.








