Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk

Fortinet ssl vpns are hit by a wave of global brute force before attackers move to Forty Managher

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fortinet ssl vpns are hit by a wave of global brute force before attackers move to Forty Managher
Identity

Fortinet ssl vpns are hit by a wave of global brute force before attackers move to Forty Managher

userBy userAugust 12, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 12, 2025Ravi LakshmananThreat Intelligence/Enterprise Security

Cybersecurity researchers have warned of “critical spikes” in brute force traffic targeting Fortinet SSL VPN devices.

Coordinated activities per threat information company Greynoise were observed on August 3, 2025, with over 780 unique IP addresses participating in this effort.

Up to 56 unique IP addresses have been detected in the last 24 hours. All IP addresses are malicious and IPS originates from the US, Canada, Russia and the Netherlands. Targets for brute force activities include the United States, Hong Kong, Brazil, Spain and Japan.

Cybersecurity

“Critical, the observed traffic targets our Fortios profile, suggesting intentional and accurate targeting of Fortinet’s SSL VPN,” Greynoise said. “This was not opportunistic. It was a focused activity.”

The company also noted that it identified two different assault waves discovered around the time of August 5th. Two include long-term brute-force activities tied to one TCP signature that is relatively stable over time, and a sudden burst of intensive traffic with another TCP signature.

“The traffic on August 3rd targets the Fortios profile, but TCP and client signatures (meta signatures) were fingerprinted since August 5th, but they didn’t hit Fortios,” the company said. “Instead, it was consistently targeting our forty managher.”

“This was indicating a change in the behavior of the attacker. It indicates pivoting to a new Fortinet service in a new infrastructure or toolset.”

In addition, a deeper look into historical data related to the August 5th TCP fingerprint reveals an early June spike featuring unique client signatures resolved to Fortigate Device, a residential ISP block managed by pilot Fiber Inc.

Identity Security Risk Assessment

This increased the likelihood that the brute force tool was first launched from a test or home network. Another hypothesis is the use of housing agents.

This development contradicts the background of the findings that, following a surge in malicious activity, the disclosure of new CVEs affecting the same technology often continues within six weeks.

“These patterns were exclusive to enterprise edge technologies such as VPNs, firewalls, and remote access tools. This is the same type of system that is increasingly targeted by sophisticated threat actors.”

Hacker news has been contacted Fortinet for further comments and will be updated if there is a reply.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCybercrime group ShinyHunters, scattered spiders join forces against fearful attacks on businesses
Next Article Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk
user
  • Website

Related Posts

Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk

August 12, 2025

Cybercrime group ShinyHunters, scattered spiders join forces against fearful attacks on businesses

August 12, 2025

New “curly hair comrades” using ngen com hijacking in Georgia app attacks Moldova

August 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Researchers find XZ Utils backdoors in dozens of Docker hub images to drive supply chain risk

Fortinet ssl vpns are hit by a wave of global brute force before attackers move to Forty Managher

Cybercrime group ShinyHunters, scattered spiders join forces against fearful attacks on businesses

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Web 3.0 Gets Personal: FySelf’s TwinH Paves the Way for User-Controlled Digital Identity

Google’s Genie 3: The Dawn of General AI?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.