Gbhackers

https://gbhackers.com/
Category Technology
Link Type Do Follow
Max Links Allowed 2
Google Indexed Pages Check Indexed Pages
Sample Guest Post https://gbhackers.com/hackers-attacking- ...
Rank: 5.1
Domain Authority: 51
Page Authority : 51
Links In: 36564
Equity: 4997
Rank: 118517
Domain Rating: 69
External Backlinks: 160213
Referring Domains: 5574
Dofollow Backlinks: 101691
Referring IPs: 5292
SemRush Rank 273773
SemRush Keywords num 19014
SemRush Traffic 5024
SemRush Costs 8034
SemRush URL Links num 2455
SemRush HOST Links num 292574
SemRush DOMAIN Links num 292868
Facebook comments 41
Facebook shares 4607
Facebook reactions 158

A widespread campaign targeting Fortinet FortiGate firewall devices with exposed management interfaces on the public internet.

The attacks, observed by Arctic Wolf between November and December 2024, exploit what is believed to be a zero-day vulnerability, allowing unauthorized access and configuration changes to critical network security infrastructure.

The campaign, which affected devices running firmware versions 7.0.14 to 7.0.16, unfolded in four distinct phases:

  1. Vulnerability Scanning (November 16-23, 2024)
  2. Reconnaissance (November 22-27, 2024)
  3. SSL VPN Configuration (December 4-7, 2024)
  4. Lateral Movement (December 16-27, 2024)

During the initial phase, attackers conducted vulnerability scans, exploiting the jsconsole command-line interface. They often used unusual or spoofed IP addresses, including loopback addresses and public DNS resolvers, to mask their activities.

Reconnaissance Phases

The reconnaissance phase involved testing administrative privileges through initial configuration changes. Subsequently, in the SSL VPN configuration phase, attackers either created new super admin accounts or hijacked existing ones to infiltrate networks further.

 

Arctic Wolf’s lead threat intelligence researcher, Stefan Hostetler, noted, “The pattern of activity we observed was consistent with opportunistic widespread exploitation, given that each of the affected victim organizations had somewhere between hundreds to thousands of malicious login events on Fortinet firewall devices.”

While the exact vulnerability remains unconfirmed, security experts strongly suspect it to be a zero-day flaw.

The compressed timeline of attacks across multiple organizations and affected firmware versions supports this assessment.

The campaign’s impact has been significant, with at least tens of organizations affected across various industries.

Fortinet acknowledged the attacks in a security advisory, confirming that threat actors had exfiltrated sensitive data, including IP addresses, credentials, and configuration information of FortiGate devices managed by compromised FortiManager appliances.

In response to this threat, cybersecurity experts are urging organizations to take immediate action:

  1. Disable public management interface access for FortiGate firewalls.
  2. Update firmware to the latest stable versions.
  3. Implement multi-factor authentication for administrative access.
  4. Monitor for anomalous login behaviors and unauthorized configuration changes.
  5. Conduct thorough threat hunting to detect potential compromises.

Fortinet has integrated detections for this campaign into its Managed Detection and Response (MDR) platform to enhance protection for customers. The company is actively investigating the issue and working on developing patches.

This incident underscores the critical importance of securing network management interfaces and limiting access to trusted internal users only.

As cyber threats continue to evolve, organizations must remain vigilant and proactive in their security measures to protect against potential vulnerabilities, especially those targeting critical network infrastructure components like firewalls.

 


Dilaways

High Completion Rate
Member since Jul 27, 2024 906 Websites

Seller Performance

Total Jobs Assigned
5
Job Completion Rate
100.0%
Highest Order Amount
$120.00
Average Order Amount
$29.80
On-Time Delivery Rate
80.0%
Repeat Hire Rate
25.0%
Average Delivery Time
1 day 16 hrs

This Website Summary

Completed Orders
0
Pending Orders
0
Failed Orders
0
Active Orders
0

Latest Published Guest Posts

Share

Similar Websites

  • MOZ DA 51
  • MOZ PA 51
  • AHREFS DR 69
https://gbhackers.com/

Gbhackers

$349 Per Post