AI-Assisted Hacker Breaches 600 Fortinet FortiGate Firewalls Across 55 Countries

Related

Cybersecurity Leaders to Watch in Tennessee’s Financial Services Industry

Tennessee's financial services sector spans community banking, regional institutions,...

The CISOs Securing Tennessee’s Healthcare Sector

Tennessee's healthcare sector operates under some of the most...

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

What happened A law enforcement operation in early March seized...

Coast Guard’s New Cybersecurity Rules Offer Lessons for CISOs

What happened The US Coast Guard's first mandatory cybersecurity framework...

Ukraine Confirms Suspected APT28 Campaign Targeting Prosecutors and Anti-Corruption Agencies

What happened Ukrainian authorities have confirmed that several government agencies...

Share

What happened

Amazon warned that a Russian-speaking threat actor breached more than 600 Fortinet FortiGate firewalls across 55 countries between January 11 and February 18, 2026, using brute-force attacks against exposed management interfaces and weak credentials rather than exploiting software vulnerabilities. The campaign targeted internet-accessible management ports and extracted sensitive configuration data including SSL-VPN credentials, administrative credentials, firewall policies, and network topology information. The attacker used generative AI services to develop custom tools, automate reconnaissance, analyze network environments, and generate attack plans to expand access within compromised networks. The campaign also targeted backup systems such as Veeam Backup & Replication, and stolen configuration data, credentials, and attack planning materials were found on exposed attacker infrastructure containing over 1,400 files. 

Who is affected

Organizations operating internet-exposed Fortinet FortiGate firewalls without multi-factor authentication or strong credential protection were directly affected, with compromised devices identified across South Asia, Latin America, the Caribbean, West Africa, Northern Europe, and Southeast Asia. 

Why CISOs should care

The incident shows how attackers used generative AI tools to automate reconnaissance, credential extraction, and lateral movement, enabling a low-to-medium skill threat actor to conduct large-scale firewall compromises across global enterprise infrastructure. 

3 practical actions

  • Secure firewall management interfaces. Restrict internet exposure of Fortinet FortiGate administrative access points. 
  • Enforce multi-factor authentication on VPN and admin accounts. Prevent brute-force access using weak credentials. 
  • Protect and audit backup infrastructure. Monitor systems such as Veeam Backup & Replication for credential extraction attempts.Â