Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI-Driven Breach Exposes FortiGate Firewalls Globally

AI-Driven Breach Exposes FortiGate Firewalls Globally

Posted on February 23, 2026 By CWS

Over 600 Fortinet FortiGate firewall systems have been compromised in a campaign driven by artificial intelligence, targeting exposed ports and weak credentials, according to a report by AWS.

Details of the AI-Powered Attack

This wave of cyber attacks took place from January 11 to February 18, focusing on the exploitation of exposed configurations rather than known vulnerabilities. AWS identified the perpetrators as unsophisticated threat actors utilizing commercial AI services to execute known attack methods.

Attackers scanned for management interfaces via ports 443, 8443, 10443, and 4443, using common credentials to gain initial access. The approach was described as opportunistic, targeting appliances vulnerable to automated mass scanning rather than specific sectors.

Global Impact and Techniques Used

The breaches affected multiple FortiGate devices within the same organizations, with some IP clusters indicating involvement of managed service providers or large networks. AWS reported compromised devices across 55 countries, spanning Africa to Europe.

Post-compromise, attackers utilized open-source tools to extract NTLM password hashes, access entire domain credential databases, and perform lateral movements through pass-the-hash or pass-the-ticket attacks. They also targeted Veeam Backup & Replication servers to extract credentials and potentially destroy backups in preparation for ransomware attacks.

AI’s Role in Cyber Operations

At least two commercial large language models (LLMs) were employed by the hackers to plan, generate tools, and manage operations, including evaluating the duration and success of attacks. The plans were influenced by academic research on offensive AI agents, indicating the actor’s interest in state-of-the-art AI penetration testing techniques.

Scripts likely generated through AI were used on the threat actor’s infrastructure to parse configurations, extract credentials, automate VPN connections, and conduct mass scanning. AWS noted that the attack toolkit, which would usually suggest a large development team, was created by a single actor or a small group using AI assistance.

The attack is believed to have been carried out by a financially motivated, Russian-speaking actor with low-to-medium technical capabilities, as evidenced by the heavy reliance on AI across all phases of the operation.

Related topics: Mississippi Hospital System closes all clinics after a ransomware attack, FBI reports $20 million losses from ATM jackpotting attacks in 2025, and Fortinet addresses vulnerabilities in FortiCloud SSO authentication.

Security Week News Tags:AI attacks, AI tools, AWS report, credential exploitation, cyber threat, Cybersecurity, firewall security, Fortigate, global hacking, vulnerable ports

Post navigation

Previous Post: Major Cyber Threats: Dell Zero-Day, Android Malware & More
Next Post: Critical jsPDF Flaw Puts Developers at Risk of Attacks

Related Posts

Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks Two US Cybersecurity Pros Plead Guilty Over Ransomware Attacks Security Week News
PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins PLoB: A Behavioral Fingerprinting Framework to Hunt for Malicious Logins Security Week News
California Gov. Gavin Newsom Signs Bill Creating AI Safety Measures California Gov. Gavin Newsom Signs Bill Creating AI Safety Measures Security Week News
Developer Who Hacked Former Employer’s Systems Sentenced to Prison Developer Who Hacked Former Employer’s Systems Sentenced to Prison Security Week News
Microsoft to Update Windows Secure Boot in 2026 Microsoft to Update Windows Secure Boot in 2026 Security Week News
Hawaiian Airlines Hacked as Aviation Sector Warned of Scattered Spider Attacks Hawaiian Airlines Hacked as Aviation Sector Warned of Scattered Spider Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Enhances Chrome Security with Device-Bound Sessions
  • Law Enforcement’s Use of Webloc for Global Device Tracking
  • AI-Powered Cyberattack Compromises Mexican Government Agencies
  • Rise of Advanced EDR Killers in Ransomware Attacks
  • Claude AI Enhances Microsoft Word with New Beta Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Enhances Chrome Security with Device-Bound Sessions
  • Law Enforcement’s Use of Webloc for Global Device Tracking
  • AI-Powered Cyberattack Compromises Mexican Government Agencies
  • Rise of Advanced EDR Killers in Ransomware Attacks
  • Claude AI Enhances Microsoft Word with New Beta Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark