Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FortiGate Firewalls Exploited by Cyber Attackers

FortiGate Firewalls Exploited by Cyber Attackers

Posted on March 10, 2026 By CWS

Cybersecurity experts are raising alarms about a recent campaign where cybercriminals are targeting FortiGate Next-Generation Firewall (NGFW) devices to infiltrate networks. This activity, detailed in a report by SentinelOne, involves exploiting newly revealed vulnerabilities or weak passwords to obtain configuration files rich with service account credentials and network topology data. The campaign particularly targets healthcare, government, and managed service provider environments.

Entry Points and Vulnerabilities

FortiGate appliances, which are integral to network security, have extensive access to the systems they protect. According to security researchers Alex Delamotte, Stephen Bromfield, Mary Braden Murphy, and Amey Patne, these devices often connect to authentication systems like Active Directory (AD) and Lightweight Directory Access Protocol (LDAP). This connectivity allows them to map user roles by correlating connection attributes with directory information, enhancing response times for security alerts.

However, these same features make FortiGate devices attractive targets for attackers. Exploiting known vulnerabilities such as CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858, or misconfigurations, attackers can gain unauthorized access. In a notable incident from November 2025, attackers breached a FortiGate appliance to create an administrative account called ‘support’ and established firewall policies that enabled unrestricted access across zones.

Credential Theft and Network Infiltration

After establishing a foothold, the attackers regularly verified the device’s accessibility, indicative of an Initial Access Broker (IAB) seeking to sell network access. By February 2026, an attacker extracted a configuration file containing encrypted LDAP credentials. SentinelOne reports that the attacker decrypted these credentials, using them to authenticate to the AD and enroll rogue devices, thereby extending their network access.

Subsequent network scanning led to the detection of the breach, halting further lateral movements. In another investigation in January 2026, attackers transitioned from firewall access to deploying remote access tools like Pulseway and MeshAgent, downloading malware via PowerShell from Amazon Web Services (AWS) to exfiltrate sensitive data.

Impact and Defensive Measures

The Java-based malware employed DLL side-loading to extract the NTDS.dit file and SYSTEM registry information to an external server. Although there was no evidence of credential misuse during this period, the potential for damage remains significant. NGFW appliances like FortiGate are pervasive due to their integrated security and management capabilities, making them lucrative targets for attackers ranging from espionage-focused state actors to financially driven cybercriminals.

Organizations must remain vigilant and ensure their FortiGate devices are regularly updated and properly configured to mitigate these risks. Enhanced monitoring and swift incident response protocols are essential in defending against such sophisticated cyber threats.

The Hacker News Tags:Active Directory, attack campaign, Cybersecurity, Fortigate, LDAP, Malware, network security, SentinelOne, service account credentials, Vulnerabilities

Post navigation

Previous Post: Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
Next Post: Microsoft Addresses 83 Security Vulnerabilities in March Update

Related Posts

What Sets Top-Tier Platforms Apart? What Sets Top-Tier Platforms Apart? The Hacker News
New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands The Hacker News
MuddyWater Intensifies Cyber Attacks in MENA with New Malware MuddyWater Intensifies Cyber Attacks in MENA with New Malware The Hacker News
Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties The Hacker News
North Korean Hackers Exploit AI for Enhanced Cyber Attacks North Korean Hackers Exploit AI for Enhanced Cyber Attacks The Hacker News
Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fortinet FortiManager Flaw Risks Unauthorized Command Execution
  • Ericsson Data Breach Exposes Thousands’ Information
  • Critical Zoom Vulnerabilities in Windows Prompt Immediate Updates
  • Adobe Addresses 80 Security Flaws in Multiple Software
  • Fortinet Patches Critical Vulnerabilities in Key Products

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fortinet FortiManager Flaw Risks Unauthorized Command Execution
  • Ericsson Data Breach Exposes Thousands’ Information
  • Critical Zoom Vulnerabilities in Windows Prompt Immediate Updates
  • Adobe Addresses 80 Security Flaws in Multiple Software
  • Fortinet Patches Critical Vulnerabilities in Key Products

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News