Category | Technology |
Link Type | Do Follow |
Max Links Allowed | 2 |
Google Indexed Pages | Check Indexed Pages |
Sample Guest Post |
https://gbhackers.com/hackers-attacking- ... |
Rank: 5.1 Domain Authority: 51 Page Authority : 51 Links In: 36564 Equity: 4997 |
|
Rank: 118517 Domain Rating: 69 External Backlinks: 160213 Referring Domains: 5574 Dofollow Backlinks: 101691 Referring IPs: 5292 |
|
SemRush Rank 273773 SemRush Keywords num 19014 SemRush Traffic 5024 SemRush Costs 8034 SemRush URL Links num 2455 SemRush HOST Links num 292574 SemRush DOMAIN Links num 292868 Facebook comments 41 Facebook shares 4607 Facebook reactions 158 |
A widespread campaign targeting Fortinet FortiGate firewall devices with exposed management interfaces on the public internet.
The attacks, observed by Arctic Wolf between November and December 2024, exploit what is believed to be a zero-day vulnerability, allowing unauthorized access and configuration changes to critical network security infrastructure.
The campaign, which affected devices running firmware versions 7.0.14 to 7.0.16, unfolded in four distinct phases:
During the initial phase, attackers conducted vulnerability scans, exploiting the jsconsole command-line interface. They often used unusual or spoofed IP addresses, including loopback addresses and public DNS resolvers, to mask their activities.
The reconnaissance phase involved testing administrative privileges through initial configuration changes. Subsequently, in the SSL VPN configuration phase, attackers either created new super admin accounts or hijacked existing ones to infiltrate networks further.
Arctic Wolf’s lead threat intelligence researcher, Stefan Hostetler, noted, “The pattern of activity we observed was consistent with opportunistic widespread exploitation, given that each of the affected victim organizations had somewhere between hundreds to thousands of malicious login events on Fortinet firewall devices.”
While the exact vulnerability remains unconfirmed, security experts strongly suspect it to be a zero-day flaw.
The compressed timeline of attacks across multiple organizations and affected firmware versions supports this assessment.
The campaign’s impact has been significant, with at least tens of organizations affected across various industries.
Fortinet acknowledged the attacks in a security advisory, confirming that threat actors had exfiltrated sensitive data, including IP addresses, credentials, and configuration information of FortiGate devices managed by compromised FortiManager appliances.
In response to this threat, cybersecurity experts are urging organizations to take immediate action:
Fortinet has integrated detections for this campaign into its Managed Detection and Response (MDR) platform to enhance protection for customers. The company is actively investigating the issue and working on developing patches.
This incident underscores the critical importance of securing network management interfaces and limiting access to trusted internal users only.
As cyber threats continue to evolve, organizations must remain vigilant and proactive in their security measures to protect against potential vulnerabilities, especially those targeting critical network infrastructure components like firewalls.