🚹 FortiGate edge intrusions are enabling deep network compromise.

Attackers exploit vulnerabilities and weak credentials to extract config files, obtain AD service credentials, deploy RMM tools, and exfiltrate NTDS.dit hashes.

Full story:
https://www.technadu.com/fortigate-edge-intrusions-lead-to-deep-network-compromise-rogue-workstations/623060/

#Cybersecurity #FortiGate #ActiveDirectory #Infosec

Attackers exploit FortiGate devices to access sensitive network info

Hackers are exploiting FortiGate devices to breach networks and steal conf data containing service account credentials and network details.

Security Affairs
How AI Assistants are Moving the Security Goalposts – Krebs on Security

CyberStrikeAI used in 600+ FortiGate intrusions across 55 countries.
AI-driven exploit orchestration + 100+ integrated tools.
21 IPs tied to China-based infra.
Patch FortiGate immediately.

Full report:
https://www.technadu.com/cyberstrikeai-deployed-in-over-600-fortigate-attacks-targeting-55-countries/622100/

#InfoSec #AIThreats #FortiGate

Bleeping Computer: Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks. “Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks. A new report by CJ Moses, CISO of Amazon Integrated Security, says that the hacking campaign occurred between [
]

https://rbfirehose.com/2026/02/28/amazon-ai-assisted-hacker-breached-600-fortinet-firewalls-in-5-weeks-bleeping-computer/
Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks (Bleeping Computer)

Bleeping Computer: Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks. “Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a c


ResearchBuzz: Firehose

THREAT MODEL: CYBERSECURITY
for Feb. 24th, 2026
by independent journalist @violetblue

- People across the US are destroying #Flock cameras

- #Discord ’s “new” ID check tool was on a US government server

- #Arizona and #Colorado want ID scanning for all computer and phone use

- @wikipedia banned #ArchiveToday for DDoS attacks

- Some rando used #AI to hack #FortiGate

- @financialtimes unmasked a Russian oil smuggling ring (from Kremlin-controlled Rosneft) through the ring’s use of a single email server

- Another major #AotearoaNewZealand health app breach

- #TimCurry reveals Clue’s secret ending

- BBC/BAFTA leave N-word intact on tape delay

...and much more.

✹ THREAT MODEL is free to read -- please help keep it accessible to all by becoming a patron, even $1 a month makes a difference! ✹

https://www.patreon.com/posts/cybersecurity-24-151516976

#ThreatModel #ThreatModelCybersecurity #ThreatModelNewsletters #VioletBlue #infosec #cybersec #CovidIsNotOver

The categorization of the Fortinet web filter is hilarious. I got a report that a certain website is incorrectly blocked by our firewall. After looking into it, the specific website belongs to a large organization.

Different organizational levels of this large organization are categorized as:

  • Political organization (federal level)
  • General organization (state level)
  • Advocacy organization (local level), giving it an R age rating (18+)

The “correct” classification should be either general organization or simply “business”.

This is wrong on many levels. Why are advocacy groups blocked by default? Why do they have an R rating (because politics is only for adults? But then why only advocacy groups and not political organizations?).

#fortinet #fortigate #fortiguard

#TIL Fortinet IPsec VPNs: they claim to support IKEv2 2FA (Certificate + EAP password), but they don't strictly enforce RFC 4739 for multiple authentication rounds.

If a native client (like strongSwan) ignores the cert and just asks for EAP, the FortiGate silently accepts it and falls back to password-only. It literally fails open!

#fortinet #fortigate #ipsec #vpn #strongswan #infosec

Amazon warns Russian-speaking hacker used AI tools to breach 600+ FortiGate firewalls across 55 countries in 5 weeks via weak credentials, no exploits. đŸ€–

Custom AI-generated scripts parsed configs, planned lateral movement, targeted Veeam backups; shows AI now amplifies low-skill attackers at scale. 🔒

🔗 https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/

#TechNews #Amazon #Privacy #Cybersecurity #AI #Hacking #Fortinet #Surveillance #DataBreach #Infosec #Malware #Linux #FOSS #Cloud #Security #Russia #Hackers #FortiGate

Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks

Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks.

BleepingComputer
Des LLM intĂ©grĂ©s Ă  un MCP orchestrent des intrusions FortiGate Ă  l’échelle mondiale (ARXON/CHECKER2)

Selon cyberandramen.net, un serveur mal configurĂ© exposĂ© dĂ©but fĂ©vrier 2026 (avec un prĂ©cĂ©dent en dĂ©cembre 2025) a rĂ©vĂ©lĂ© l’outillage complet d’une opĂ©ration d’intrusion active ciblant des organisations sur plusieurs continents. La singularitĂ© de cette campagne rĂ©side dans l’intĂ©gration d’un pipeline LLM au cƓur du workflow d’attaque pour trier les cibles, produire des plans d’attaque et maintenir plusieurs intrusions en parallĂšle. 🚹 Principales constatations. Un rĂ©pertoire ouvert a exposĂ© un arsenal opĂ©rant avec des victimes confirmĂ©es dans au moins 5 pays. L’opĂ©ration automatise la crĂ©ation de portes dĂ©robĂ©es sur des appliances Fortinet FortiGate, se connecte aux rĂ©seaux victimes, cartographie l’infrastructure interne, puis transmet les rĂ©sultats Ă  des LLM pour analyse. DeepSeek gĂ©nĂšre des plans d’attaque, tandis que Claude Code produit des Ă©valuations de vulnĂ©rabilitĂ© et est configurĂ© pour exĂ©cuter des outils offensifs (Impacket, Metasploit, hashcat) via un fichier de paramĂštres contenant des identifiants d’un grand mĂ©dia asiatique. Un serveur MCP inĂ©dit (« ARXON ») sert de pont vers les modĂšles et maintient une base de connaissance croissante par cible. Entre dĂ©cembre et fĂ©vrier, l’acteur est passĂ© d’un outil MCP open source (HexStrike) Ă  un systĂšme d’exploitation pleinement automatisĂ© (ARXON + CHECKER2). Des logs indiquent que le serveur source a Ă©tĂ© utilisĂ© pour des sessions SSH modifiant des configurations FortiGate dans plusieurs pays. Des compromis confirmĂ©s touchent une sociĂ©tĂ© de gaz industrielle en Asie-Pacifique, un opĂ©rateur tĂ©lĂ©com en Turquie et le mĂ©dia asiatique mentionnĂ©, avec des reconnaissances additionnelles visant la CorĂ©e du Sud, l’Égypte, le Vietnam et le Kenya.

CyberVeille