While I fully agree with the sentiment, I'd like to know _why_ my #Fortigate #firewall suddenly stops all users from loading office.com whenever any application filter profile is active on that network. This happens even if all filter rules are set to monitor or allow.

The FW log doesn't show anything, but the browser seems to hang on handshake, so I'm wondering if it might be related to the current SSL vulnerability that I haven't yet read up on.

Zawsze mówiłem że za Fortigate stoi dialog:
- Jest tanio?
- Jest tanio!
- Jest dobrze?
- Jest tanio!
https://sekurak.pl/zhackowali-infrastrukture-30-farm-wiatrowych-i-fotowoltaicznych-w-polsce-pelne-szczegoly-cyberataku/
#infosec #security #fortigate
Zhackowali infrastrukturę 30+ farm wiatrowych i fotowoltaicznych w Polsce. Pełne szczegóły cyberataku.

Atakujący dostali się do infrastruktury farm / posiadali wysokie uprawnienia, ale finalnie nie miało to wpływu na stabilność dostaw prądu w Polsce. Jak czytamy w raporcie CERT Polska (cytaty z raportu oznaczamy kursywą): (…) z uwagi na poziom dostępów uzyskanych przez atakującego istniało ryzyko spowodowania przestoju w produkcji energii elektrycznej...

Sekurak

Skoordynowany atak na polską elektrociepłownię – zimowy sygnał alarmowy

Czy gdy na zewnątrz trzaska mróz, ktoś przez dziewięć miesięcy gramoli się przez Twoją serwerownię? W jednej z polskich elektrociepłowni – tak.

Czytaj dalej:
https://pressmind.org/skoordynowany-atak-na-polska-elektrocieplownie-zimowy-sygnal-alarmowy/

#PressMindLabs #certpolska #edr #fortigate #oze #statictundra

📢 CERT Polska révèle des attaques destructrices coordonnées contre l’énergie et l’industrie en Pologne
📝 Selon CERT Polska (CSIRT NASK), un ensemble d’attaques purement destructrices a visé le 29 décembre 2025...
📖 cyberveille : https://cyberveille.ch/posts/2026-01-30-cert-polska-revele-des-attaques-destructrices-coordonnees-contre-lenergie-et-lindustrie-en-pologne/
🌐 source : https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/
#FortiGate #ICS_OT #Cyberveille
CERT Polska révèle des attaques destructrices coordonnées contre l’énergie et l’industrie en Pologne

Selon CERT Polska (CSIRT NASK), un ensemble d’attaques purement destructrices a visé le 29 décembre 2025 au moins 30 fermes éoliennes/solaires, une grande centrale de cogénération (CHP) et une entreprise manufacturière en Pologne. Les opérations ont touché à la fois l’IT et l’OT, sans demande de rançon, et ont été conduites par un même acteur. • Cible et impact OT (renouvelables) ⚡️ Perte de communication entre les sites et les DSOs via le GCP; production non interrompue mais risque de perturbation. Vecteur: dispositifs FortiGate exposés (SSL‑VPN sans MFA, comptes statiques), réinitialisés usine pour effacer les traces. Actions: exploitation d’identifiants par défaut et interfaces locales pour endommager l’OT: Hitachi RTU560: connexion web avec compte “Default”, téléversement de firmware corrompu (ELF modifié) causant boucle de reboot; sécurisation de mise à jour non activée ou contournée (CVE‑2024‑2617; corrigé en 13.7.7). Mikronika RTUs: SSH root par défaut, suppression massive de fichiers. Hitachi Relion 650 v1.1 (IEDs): FTP par défaut pour supprimer des fichiers critiques → arrêt irréversible. Mikronika HMI (Win10): RDP via admin local connu, ouverture SMB/445, Impacket, déploiement de DynoWiper. Moxa NPort 6xxx: reset usine, mot de passe changé, IP mise à 127.0.0.1 pour retarder la reprise. • Intrusion et tentative de sabotage IT (CHP) 🏭

CyberVeille

📰 Warning: Fully Patched FortiGate Firewalls Are Being Compromised via New SSO Bypass

CRITICAL: Fully patched FortiGate firewalls are being compromised via a new SAML SSO bypass. 🚨 Attackers are gaining admin access, creating persistence, and stealing configs. Disable SSO on management interfaces now! #Fortinet #FortiGate #CyberAttack

🔗 https://cyber.netsecops.io/articles/fully-patched-fortigate-firewalls-compromised-via-sso-bypass/?utm_source=mastodon&utm_medium=soc…

Warning: Fully Patched FortiGate Firewalls Are Being Compromised via New SSO Bypass

Security alert: A new attack is compromising even fully patched Fortinet FortiGate firewalls by exploiting a new SAML SSO authentication bypass, granting attackers administrative access.

CyberNetSec.io

#opnsense migration: Complete.

The preparation legwork made lots of things easier, but even once swapped I realized I had about 5% of it wrong.

I also still had a #virtualip in the config from the first hour of having it running when I was trying to migrate away from my VIPs in a #fortigate, which are a TOTALLY different thing.

NAT Reflection eluded me for a good hour, but all the VLANs behave, #kea DHCP seems to be all up and running and #ntopNG is much nicer than some of the built in systems of #fortinet.

#IDS feels innately trickier than before but pros and cons.

🇫🇷 Fortinet : une #faille mal bouchée déclenche une vague de cyberattaques contre des entreprises
https://www.numerama.com/cyberguerre/2165471-une-faille-mal-bouchee-declenche-une-vague-dattaques-automatisees-contre-des-entreprises.html

🇬🇧 #Fortinet #Firewalls Hit With Malicious Configuration Changes. Automated infections of potentially fully patched #FortiGate devices are allowing threat actors to steal firewall configuration files.
https://www.darkreading.com/cloud-security/fortinet-firewalls-malicious-configuration-changes
#sécurité #security

Piratage Fortinet FortiGate : désactivez le SSO pour éviter l'intrusion

Les pare-feu Fortinet FortiGate, déployés dans des milliers d’entreprises et d’administrations à travers le monde, sont actuellement la cible d’une vaste campagne de cyberattaques automatisées. Ce qui inquiète particulièrement l’écosystème cyber : des correctifs avaient déjà été publiés pour contrer ce type

Numerama
Hackers breach Fortinet FortiGate devices, steal firewall configs

Fortinet FortiGate devices are being targeted in automated attacks that create rogue accounts and steal firewall configuration data, according to cybersecurity company Arctic Wolf.

BleepingComputer

It's been a busy 24 hours in the cyber world with critical zero-days, active exploitation of known flaws, nation-state activity, and important updates on regulatory enforcement and government cyber agencies. Let's dive in:

Energy Sector Phishing & Ransomware Leader Guilty 🚨

- Microsoft has detailed a multi-stage phishing and Business Email Compromise (BEC) campaign targeting energy sector organisations. Attackers used compromised Microsoft accounts, SharePoint URLs, and credential harvesting to take over inboxes and send hundreds of phishing emails to internal and external contacts.
- Attackers set inbox rules to delete incoming emails and out-of-office replies, and even responded to queries about the legitimacy of the phish, demonstrating sophisticated social engineering.
- In other news, Russian national Ianis Antropenko pleaded guilty to leading a ransomware conspiracy (Zeppelin, GlobeImposter) that targeted at least 50 victims over four years, causing $1.5 million in losses. Authorities seized over $3.4 million in cryptocurrency and cash from him.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/22/crims_compromised_energy_firms_microsoft/
🤫 CyberScoop | https://cyberscoop.com/ianis-antropenko-russian-ransomware-leader-guilty/

DPRK Abuses VS Code Tunnels, Malicious PyPI Package Spreads Miner 🌑

- North Korean actors are deploying spear-phishing campaigns that abuse Microsoft VS Code's built-in tunneling feature to gain full remote control of targeted systems. This technique allows attackers to bypass traditional C2 infrastructure and custom malware, blending in with legitimate developer activity.
- The attacks, primarily targeting South Korean entities, use JSE files disguised as HWPX documents to install VS Code and establish a tunnel, giving attackers interactive access to the VS Code terminal and file browser via trusted Microsoft infrastructure.
- Separately, a malicious PyPI package named `sympy-dev` has been found impersonating the legitimate `SymPy` library to deploy an XMRig cryptocurrency miner on Linux hosts. The malware is designed to trigger only when specific polynomial routines are called and uses memory-backed file descriptors to reduce on-disk artifacts.

🌑 Dark Reading | https://www.darkreading.com/endpoint-security/dprk-vs-code-tunnels-remote-hacking
🚨 The Hacker News | https://thehackernews.com/2026/01/malicious-pypi-package-impersonates.html

Cisco Zero-Day Under Active Exploitation ⚠️

- Cisco has released emergency patches for a critical zero-day vulnerability, CVE-2026-20045 (CVSS 8.2), affecting multiple Unified Communications products and Webex Calling Dedicated Instance.
- The flaw allows unauthenticated remote attackers to execute arbitrary commands on the underlying operating system and escalate privileges to root via crafted HTTP requests to the web-based management interface.
- CISA has added CVE-2026-20045 to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies apply fixes by February 11, 2026. No workarounds are available, so immediate patching is crucial.

🚨 The Hacker News | https://thehackernews.com/2026/01/cisco-fixes-actively-exploited-zero-day.html
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/22/another_week_another_emergency_patch/

FortiGate SSO Bypass Exploited, SmarterMail Auth Bypass Also Hit 🛡️

- Arctic Wolf has warned of automated malicious activity targeting Fortinet FortiGate devices, involving unauthorised firewall configuration changes via compromised SSO accounts. Attackers are creating persistence accounts, modifying VPN/firewall rules, and exfiltrating configuration files.
- This activity aligns with exploitation of CVE-2025-59718 and CVE-2025-59719, SSO authentication bypasses patched in December 2025. However, some administrators report exploitation on fully patched FortiOS 7.4.10, suggesting a patch bypass, with Fortinet reportedly preparing further fixes.
- In other news, a critical authentication bypass (WT-2026-0001) in SmarterTools SmarterMail email software was actively exploited just two days after a patch release. The flaw allows unauthenticated users to reset the system administrator password and then achieve Remote Code Execution (RCE) via a built-in volume mount command feature.

🚨 The Hacker News | https://thehackernews.com/2026/01/automated-fortigate-attacks-exploit.html
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/22/fortigate_firewalls_hit_by_silent/
🚨 The Hacker News | https://thehackernews.com/2026/01/smartermail-auth-bypass-exploited-in.html

Ancient Telnet Bug Hands Out Root Access 👴

- A critical, 11-year-old vulnerability (CVE-2026-24061, CVSS 9.8) in the GNU InetUtils telnet daemon (`telnetd`) has been disclosed and is being actively exploited.
- The bug allows attackers to trivially gain root access by sending a crafted `USER` environment variable (`-f root`) during connection, bypassing normal authentication.
- Experts strongly recommend decommissioning `telnetd` entirely due to its unencrypted nature, or at minimum, patching immediately and restricting network access to the telnet port to trusted clients only.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/22/root_telnet_bug/

AI Agents Pose New Insider Threat, Financial Sector Still Lags on Basics, New CVE System Launched 🧠

- A Davos panel highlighted AI agents as a potential "ultimate insider threat," posing new security challenges as they can access sensitive data and perform harmful tasks. Recommendations include implementing zero trust, least-privilege access, and "guard agents" to monitor AI behaviour.
- The UK's 2025 CBEST report revealed that financial organisations continue to miss basic cybersecurity safeguards, with common weaknesses including poor access controls, misconfigured/unpatched systems, and ineffective detection. Social engineering remains a significant threat due to poor staff culture and awareness.
- The Computer Incident Response Center Luxembourg (CIRCL) has launched the Global CVE Allocation System (GCVE), a decentralised alternative to MITRE's CVE program. GCVE allows independent numbering authorities to assign vulnerability identifiers, aiming to address concerns about CVE's governance and sustainability.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/21/davos_ai_agents_security/
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/22/financial_sector_cyber_gap/
🤫 CyberScoop | https://cyberscoop.com/gcve-vulnerability-database-launches/

Cellebrite Misused by Jordan, Spain Closes Pegasus Probe ⚖️

- Citizen Lab reported that Jordanian authorities used Cellebrite digital forensic software to extract data from phones of at least seven activists critical of the Gaza war, often during interrogations or detentions. This highlights the ongoing misuse of surveillance technology against civil society.
- Separately, a Spanish judge closed a probe into the use of Pegasus spyware against top government officials due to a lack of cooperation from Israel, which regulates NSO Group's exports. The court found evidence of crimes that "jeopardised the security of the Spanish State."

🗞️ The Record | https://therecord.media/jordan-used-cellebrite-against-activists-critical-gaza-war
🗞️ The Record | https://therecord.media/spanish-judge-closes-nso-group-spyware-probe-israel

GDPR Fines Surge as Breach Notifications Hit Record High 📈

- DLA Piper's latest survey shows GDPR fines surpassed €1.2 billion in 2025, bringing the total since May 2018 to €7.1 billion. Daily data breach notifications surged 22% to an average of 443, the first time exceeding 400.
- Ireland remains the top enforcer, with a €530 million fine against TikTok being the largest in 2025. The report attributes the rise in breaches to geopolitics, cyber incidents, and new reporting regimes like NIS2 and DORA.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/22/europes_gdpr_cops_dished_out/

CISA and NIST Face Staffing Challenges 📉

- CISA's acting head, Madhu Gottumukkala, faced intense questioning from lawmakers over significant personnel reductions (nearly 1,000 staff lost since 2017) and reported attempts to fire the agency's CIO. Democrats expressed concern about weakened defences and reassignments, while Republicans suggested CISA was "doing more with less."
- NIST is also grappling with staff cuts (over 700 positions lost since 2025) and a shrinking budget, impacting its critical work on cybersecurity, AI, and post-quantum encryption. The Information Technology Laboratory (ITL) lost 89 employees, forcing a narrower focus and hindering efforts to reduce backlogs in its human-intensive cryptographic validation program.

🤫 CyberScoop | https://cyberscoop.com/cisa-madhu-gottumukkala-house-homeland-hearing-workforce-staffing-levels/
🤫 CyberScoop | https://cyberscoop.com/encryption-nist-officials-detail-staff-cuts-impact/

#CyberSecurity #ThreatIntelligence #Vulnerability #ZeroDay #RCE #APT #Ransomware #Malware #DataPrivacy #GDPR #InfoSec #CISA #NIST #AI #SocialEngineering #FortiGate #Cisco #Telnet #CyberAttack

Crims compromised energy firms' Microsoft accounts, sent 600 phishing emails

: Logging in, not breaking in

The Register
Arctic Wolf detects surge in automated Fortinet FortiGate Firewall configuration attacks

Arctic Wolf warned of a new wave of automated attacks making unauthorized firewall configuration changes on Fortinet FortiGate devices.

Security Affairs