Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs

Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs

Posted on August 12, 2025August 13, 2025 By CWS

An unprecedented surge in brute-force assaults concentrating on Fortinet SSL VPN infrastructure, with over 780 distinctive IP addresses taking part in coordinated assault campaigns. 

The August third assault represents the best single-day quantity recorded on GreyNoise’s Fortinet SSL VPN Bruteforcer tag in current months, elevating considerations about potential zero-day vulnerabilities and complex risk actor operations.

Key Takeaways1. 780 distinctive IPs launched the most important recorded brute-force marketing campaign towards Fortinet SSL VPNs on August third.2. Attackers shifted targets from FortiOS to FortiManager programs inside days, exhibiting refined operational evolution.3. 80% of comparable spikes precede CVE disclosures inside six weeks—organizations ought to put together for emergency patches.

Fortinet Assault Waves Detected

GreyNoise recognized two distinct assault waves with markedly completely different traits and concentrating on methodologies. 

The primary wave consisted of sustained brute-force exercise using a constant TCP signature that maintained regular site visitors patterns over prolonged intervals. 

Concentrating on Fortinet SSL VPN 

Nonetheless, the second wave, starting August fifth, demonstrated a totally completely different TCP signature profile and exhibited concentrated burst patterns that recommended coordinated infrastructure deployment.

The preliminary August third site visitors particularly focused GreyNoise’s FortiOS profile, indicating exact reconnaissance and deliberate concentrating on of Fortinet’s SSL VPN implementations. 

Nonetheless, researchers noticed a major tactical shift when site visitors fingerprinted with mixed TCP and consumer signatures started persistently concentrating on FortiManager – FGFM profiles as a substitute of FortiOS programs. 

This behavioral pivot suggests both the identical risk infrastructure adapting to new assault vectors or refined toolset evolution concentrating on completely different Fortinet-facing providers.

Key malicious IP addresses recognized within the marketing campaign embody 31.206.51.194, 23.120.100.230, 96.67.212.83, 104.129.137.162, and 118.97.151.34, amongst others. Geographic evaluation reveals Hong Kong and Brazil as the first goal nations over the previous 90 days.

Investigation into historic information tied to post-August fifth TCP fingerprints revealed intriguing connections to residential community infrastructure. 

GreyNoise found an earlier June spike that includes a singular consumer signature that resolved to IP handle 104.129.137.162, recognized as a FortiGate machine working inside a residential ISP block managed by Pilot Fiber Inc.

This residential connection suggests both preliminary tooling growth and testing from residence networks or refined use of residential proxy providers to obfuscate assault origins. 

The machine confirmed current detections by AbuseDB however remained undetected by residential proxy identification providers like Spur.us, indicating potential evasion capabilities.

JA4+ signature evaluation revealed clustering patterns connecting current assault waves to prior site visitors, establishing potential attribution hyperlinks throughout a number of marketing campaign phases. 

GreyNoise analysis signifies that 80% of comparable assault spikes precede CVE disclosure inside six weeks, suggesting imminent vulnerability bulletins affecting Fortinet infrastructure.

Organizations using Fortinet SSL VPN options ought to instantly implement dynamic IP blocklists and monitor for site visitors matching the recognized assault signatures whereas making ready for potential emergency patching necessities.

Enhance your SOC and assist your staff defend your small business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attack, Attacking, Fortinet, Hackers, IPs, SSL, Unique, VPN

Post navigation

Previous Post: Inside the Dark Web’s Access Economy: How Hackers Sell the Keys to Enterprise Networks
Next Post: Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges

Related Posts

CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks CISA Warns of Apple WebKit Vulnerability 0-Day Vulnerability Exploited in Attacks Cyber Security News
A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection Cyber Security News
Cybercriminals Exploit Cloud Services for Phishing Cybercriminals Exploit Cloud Services for Phishing Cyber Security News
New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild Cyber Security News
Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules Cyber Security News
Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark