Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google VP warns two types of AI startups may not survive

7 days left until Disrupt 2026 ticket price increase

AI-assisted attackers compromise over 600 FortiGate devices in 55 countries

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » AI-assisted attackers compromise over 600 FortiGate devices in 55 countries
Identity

AI-assisted attackers compromise over 600 FortiGate devices in 55 countries

userBy userFebruary 21, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Russian-speaking, financially motivated attackers have been observed leveraging commercial generative artificial intelligence (AI) services to compromise more than 600 FortiGate devices in 55 countries.

This is according to new findings from Amazon Threat Intelligence, which observed activity from January 11, 2026 to February 18, 2026.

CJ Moses, chief information security officer (CISO) at Amazon Integrated Security, said in the report, “We did not observe any exploitation of the FortiGate vulnerability. Instead, this campaign succeeded by exploiting exposed management ports and weak credentials through single-factor authentication. These fundamental security gaps were helped by AI to exploit at scale by unsophisticated attackers.”

The tech giant explained that threat actors have limited technical capabilities and overcame them by relying on multiple commercially generated AI tools to perform various stages of the attack cycle, including tool development, attack planning, and command generation.

While one AI tool served as the primary backbone of the operation, the attackers also relied on a second AI tool as a fallback to help pivot within specific compromised networks. The name of the AI ​​tool has not been disclosed.

This actor is assessed to be motivated by financial gain and not associated with advanced persistent threats (APT) from state-sponsored resources. As Google recently highlighted, generative AI tools are increasingly being adopted by attackers to scale and accelerate their operations, even if they don’t have new uses for the technology.

Rather, the emergence of AI tools means that functions that were once off-limits to novice or technically challenged attackers are increasingly viable, lowering the barrier to entry for cybercriminals and allowing them to devise attack methods.

“They are likely economically motivated individuals or small groups who, through the enhancement of AI, have achieved operational scale that previously would have required much larger and more skilled teams,” Moses said.

Amazon’s investigation into the attacker’s activities revealed that the attacker compromised multiple organizations’ Active Directory environments, extracted complete credential databases, and even penetrated the targets’ backup infrastructure prior to deploying the ransomware.

What’s interesting here is that rather than devise a way to survive within a hardened environment or one with advanced security controls, the attackers chose to abandon their target entirely and move on to a relatively benign victim. This shows that AI is being used as a way to close the skills gap to make picking easier.

Amazon said it has identified publicly accessible infrastructure controlled by the attackers that was hosting various artifacts related to the campaign. This includes AI-generated attack plans, victim configurations, and source code for custom tools. The overall modus operandi resembles an “AI-powered cybercrime assembly line,” the company added.

At the core of this attack, attackers were able to compromise the FortiGate appliance and extract the complete device configuration, which allowed them to collect credentials, network topology information, and device configuration information.

This included a systematic scan of FortiGate management interfaces exposed to the internet via ports 443, 8443, 10443, and 4443, followed by an attempt to authenticate using commonly reused credentials. This activity was sector agnostic and represented automated mass scanning of vulnerable appliances. The scan occurred from IP address 212.11.64.[.]250.

The stolen data was then used to penetrate deep into the target’s network and perform post-exploitation activities such as reconnaissance vulnerability scanning using Nuclei, Active Directory compromise, credential capture, and access to backup infrastructure in line with typical ransomware operations.

According to data collected by Amazon, the scanning activity resulted in an organization-level compromise that resulted in access to multiple FortiGate devices belonging to the same entity. Compromised clusters have been detected across South Asia, Latin America, the Caribbean, West Africa, Northern Europe, and Southeast Asia.

“After gaining VPN access to the victim’s network, the attacker deploys different versions of custom reconnaissance tools written in both Go and Python,” the company said.

“Analysis of the source code revealed clear signs of AI-assisted development: redundant comments that simply restate function names, a simplified architecture with a disproportionate investment in format over functionality, simple JSON parsing with string matching rather than proper deserialization, and built-in language compatibility shims with empty documentation stubs.”

Here are some of the other steps threat actors take after the reconnaissance phase:

Compromise a domain via a DCSync attack. Moves laterally through networks via pass-the-hash/pass-the-ticket attacks, NTLM relay attacks, and remote command execution on Windows hosts. Targets Veeam Backup & Replication servers and deploys credential harvesting tools and programs designed to exploit known Veeam vulnerabilities, such as CVE-2023-27532 and CVE-2024-40711.

Another notable finding is a pattern of repeated failures when attackers try to exploit something beyond the “simplest, automated attack vectors,” with the attackers’ own documentation noting that their targets have either patched the service, closed required ports, or do not have vulnerable exploitation vectors.

With Fortinet appliances becoming attractive targets for threat actors, it is important for organizations to ensure that management interfaces are not exposed to the Internet, change default and common credentials, rotate SSL-VPN user credentials, implement multi-factor authentication for management and VPN access, and audit unauthorized management accounts or connections.

It’s also important to isolate backup servers from general network access, ensure all software programs are up to date, and monitor for unintended network exposure.

“This trend is expected to continue in 2026, so organizations should expect a continued increase in the amount of AI-enhanced threat activity from both skilled and unskilled attackers,” said Moses. “A strong defense foundation remains the most effective countermeasure: perimeter device patch management, credential hygiene, network segmentation, and robust detection of post-exploitation indicators.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAnthropic launches Claude Code Security, an AI-powered vulnerability scan
Next Article 7 days left until Disrupt 2026 ticket price increase
user
  • Website

Related Posts

Anthropic launches Claude Code Security, an AI-powered vulnerability scan

February 21, 2026

CISA Adds Two Actively Exploited Round Cube Flaws to KEV Catalog

February 21, 2026

EC-Council Expands AI Certification Portfolio to Strengthen the Responsiveness and Security of U.S. AI Talent

February 21, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google VP warns two types of AI startups may not survive

7 days left until Disrupt 2026 ticket price increase

AI-assisted attackers compromise over 600 FortiGate devices in 55 countries

Anthropic launches Claude Code Security, an AI-powered vulnerability scan

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.