Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA adds actively exploited VMware Aria operational flaw CVE-2026-22719 to KEV catalog

Why are AI startups selling the same stock at two different prices?

A series of government hacking tools targeting iPhones are being used by cybercriminals

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Open Source CyberStrikeAI Deploys AI-Driven FortiGate Attacks in 55 Countries
Identity

Open Source CyberStrikeAI Deploys AI-Driven FortiGate Attacks in 55 Countries

userBy userMarch 3, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 3, 2026Vulnerability / Artificial Intelligence

The attackers behind the recently revealed artificial intelligence (AI)-assisted campaign targeting Fortinet’s FortiGate appliances leveraged an open-source AI-native security testing platform called CyberStrikeAI to carry out the attack.

This new discovery is attributed to Team Cymru, whose use was detected after analyzing the IP address (‘212.11.64’).[.]250″) was used by a suspected Russian-speaking attacker to perform automated mass scans of vulnerable appliances.

CyberStrikeAI is “an open source artificial intelligence (AI) offensive security tool (OST) developed by a developer based in China that we believe has some connection to the Chinese government,” said security researcher Will Thomas (also known as @BushidoToken).

Details of the AI-powered activity were revealed last month when Amazon Threat Intelligence announced that it detected an unknown attacker using generative artificial intelligence (AI) services such as Anthropic Claude and DeepSeek to systematically target FortiGate devices and compromise more than 600 appliances in 55 countries.

According to the GitHub repository description, CyberStrikeAI is built with Go and integrates over 100 security tools to enable vulnerability discovery, attack chain analysis, knowledge capture, and results visualization. It is maintained by a Chinese developer with the online alias Ed1s0nZ.

Team Cymru announced that it observed 21 unique IP addresses running CyberStrikeAI on servers primarily hosted in China, Singapore, and Hong Kong between January 20 and February 26, 2026. Additional servers associated with this tool were also discovered in the United States, Japan, and Switzerland.

In addition to hosting CyberStrikeAI, the Ed1s0nZ account has exposed several other tools that show interest in exploiting and jailbreaking AI models.

Watermark-tool adds an invisible digital watermark to your documents. Banana_blackmail (Golang-based ransomware), PrivHunterAI (Golang-based tool that uses Kimi, DeepSeek, and GPT models to detect privilege escalation vulnerabilities). ChatGPTJailbreak. It includes a README.md file that contains prompts to jailbreak OpenAI ChatGPT by tricking it into entering Do Anything Now (DAN) mode or asking it to act as ChatGPT with developer mode enabled. InfiltrateX is a Golang-based scanner for detecting privilege escalation vulnerabilities. VigilantEye is a Golang-based tool that monitors the disclosure of sensitive information such as phone numbers and ID card numbers in a database. It is configured to send alerts via the WeChat Work bot if a potential data breach is detected.

“Additionally, Ed1s0nZ’s GitHub activity indicates that they are interacting with organizations that potentially support the Chinese government’s state-sponsored cyber operations,” Thomas said. “This includes private Chinese companies with known ties to China’s Ministry of State Security (MSS).”

One such company contacted by developers is Knownsec 404, a Chinese security vendor. The company suffered a major leak of more than 12,000 internal documents late last year, exposing a trove of stolen data including the company’s employee data, government customers, hacking tools, information related to South Korean phone records and Taiwanese critical infrastructure organizations, and the inner workings of ongoing cyber operations targeting other countries.

“On the surface, KnownSec appeared to be just a security company, but this is only a half-truth,” DomainTools said in an analysis published in January, describing it as a “state-aligned cyber contractor” capable of supporting China’s national security, intelligence, and military objectives.

“in fact, […] China has shadow organizations working for the People’s Liberation Army, the MSS, and the organs of the Chinese security state. This leak exposed a company operating far beyond the role of a typical cybersecurity vendor. Tools like ZoomEye and the Critical Infrastructure Target Library provide China with a global reconnaissance system that catalogs millions of foreign IPs, domains, and organizations mapped by sector, geography, and strategic value. ”

Ed1s0nZ was also observed to actively modify and remove references to the README.md file in the repository of the same name, which was awarded the China National Information Security Vulnerability Database (CNNVD) Level 2 Contribution Award. The developer also claims that “everything shared here is purely for research and learning.”

According to research published by Bitsight last month, China maintains two separate vulnerability databases: CNNVD and China National Vulnerability Database (CNVD). CNNVD is supervised by the Ministry of State Security, while CNVD is managed by CNCERT. Recorded Future’s previous findings revealed that CNNVD takes longer to publish vulnerabilities with higher CVSS scores than vulnerabilities with lower CVSS scores.

“The developer’s recent attempt to remove references to CNNVD from its GitHub profile indicates an active effort to hide these state connections, likely to protect the operational viability of the tool as it grows in popularity,” Thomas said. “CyberStrikeAI adoption is accelerating and represents an alarming evolution in the proliferation of AI-enhanced offensive security tools.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMore investment needed in U.S. fusion and plasma technology
Next Article The 3 Steps CISOs Must Follow
user
  • Website

Related Posts

CISA adds actively exploited VMware Aria operational flaw CVE-2026-22719 to KEV catalog

March 4, 2026

Fake tech support spam deploys customized Havoc C2 across organization

March 3, 2026

The 3 Steps CISOs Must Follow

March 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA adds actively exploited VMware Aria operational flaw CVE-2026-22719 to KEV catalog

Why are AI startups selling the same stock at two different prices?

A series of government hacking tools targeting iPhones are being used by cybercriminals

Alibaba’s Qwen technology chief resigns amid massive AI push

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.