Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Advanced PFAS treatment technology: innovation and development

Former Founders Fund VC Sam Blond launches AI sales startup that will transform Salesforce

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fortinet ssl vpns are hit by a wave of global brute force before attackers move to Forty Managher
Identity

Fortinet ssl vpns are hit by a wave of global brute force before attackers move to Forty Managher

userBy userAugust 12, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 12, 2025Ravi LakshmananThreat Intelligence/Enterprise Security

Cybersecurity researchers have warned of “critical spikes” in brute force traffic targeting Fortinet SSL VPN devices.

Coordinated activities per threat information company Greynoise were observed on August 3, 2025, with over 780 unique IP addresses participating in this effort.

Up to 56 unique IP addresses have been detected in the last 24 hours. All IP addresses are malicious and IPS originates from the US, Canada, Russia and the Netherlands. Targets for brute force activities include the United States, Hong Kong, Brazil, Spain and Japan.

Cybersecurity

“Critical, the observed traffic targets our Fortios profile, suggesting intentional and accurate targeting of Fortinet’s SSL VPN,” Greynoise said. “This was not opportunistic. It was a focused activity.”

The company also noted that it identified two different assault waves discovered around the time of August 5th. Two include long-term brute-force activities tied to one TCP signature that is relatively stable over time, and a sudden burst of intensive traffic with another TCP signature.

“The traffic on August 3rd targets the Fortios profile, but TCP and client signatures (meta signatures) were fingerprinted since August 5th, but they didn’t hit Fortios,” the company said. “Instead, it was consistently targeting our forty managher.”

“This was indicating a change in the behavior of the attacker. It indicates pivoting to a new Fortinet service in a new infrastructure or toolset.”

In addition, a deeper look into historical data related to the August 5th TCP fingerprint reveals an early June spike featuring unique client signatures resolved to Fortigate Device, a residential ISP block managed by pilot Fiber Inc.

Identity Security Risk Assessment

This increased the likelihood that the brute force tool was first launched from a test or home network. Another hypothesis is the use of housing agents.

This development contradicts the background of the findings that, following a surge in malicious activity, the disclosure of new CVEs affecting the same technology often continues within six weeks.

“These patterns were exclusive to enterprise edge technologies such as VPNs, firewalls, and remote access tools. This is the same type of system that is increasingly targeted by sophisticated threat actors.”

Hacker news has been contacted Fortinet for further comments and will be updated if there is a reply.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePixel 10, AI features, and everything else you’ll expect from creating Google 2025 events
Next Article Confusion offers to buy chrome with billions more people than they were raised
user
  • Website

Related Posts

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

February 11, 2026

Public training opens the door to crypto mining in Fortune 500 cloud environments

February 11, 2026

Microsoft patches 59 vulnerabilities, including 6 actively exploited zero-days

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Advanced PFAS treatment technology: innovation and development

Former Founders Fund VC Sam Blond launches AI sales startup that will transform Salesforce

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

Rethinking plastic packaging with innovative biomaterials and AI

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.