Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations

Posted on January 22, 2026January 22, 2026 By CWS

Ravie LakshmananJan 22, 2026Network Safety / Vulnerability
Cybersecurity firm Arctic Wolf has warned of a “new cluster of automated malicious exercise” that entails unauthorized firewall configuration modifications on Fortinet FortiGate gadgets.
The exercise, it stated, commenced on January 15, 2026, including it shares similarities with a December 2025 marketing campaign by which malicious SSO logins on FortiGate home equipment had been recorded in opposition to the admin account from completely different internet hosting suppliers by exploiting CVE-2025-59718 and CVE-2025-59719.
Each vulnerabilities enable for unauthenticated bypass of SSO login authentication by way of crafted SAML messages when the FortiCloud single sign-on (SSO) characteristic is enabled on affected Units. The shortcomings affect FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager.

“This exercise concerned the creation of generic accounts meant for persistence, configuration modifications granting VPN entry to these accounts, in addition to exfiltration of firewall configurations,” Arctic Wolf stated of the growing menace cluster.
Particularly, this entails finishing up malicious SSO logins in opposition to a malicious account “[email protected]” from 4 completely different IP addresses, following which the firewall configuration information are exported to the identical IP addresses by way of the GUI interface. The checklist of supply IP addresses is under –

104.28.244[.]115
104.28.212[.]114
217.119.139[.]50
37.1.209[.]19

As well as, the menace actors have been noticed creating secondary accounts, resembling “secadmin,” “itadmin,” “assist,” “backup,” “remoteadmin,” and “audit,” for persistence.
“All the above occasions passed off inside seconds of one another, indicating the opportunity of automated exercise,” Arctic Wolf added.

The disclosure coincides with a publish on Reddit by which a number of customers reported seeing malicious SSO logins on fully-patched FortiOS gadgets, with one person stating the “Fortinet developer staff has confirmed the vulnerability persists or shouldn’t be mounted in model 7.4.10.”
The Hacker Information has reached out to Fortinet for remark, and we’ll replace the story if we hear again. Within the interim, it is suggested to disable the “admin-forticloud-sso-login” setting.

The Hacker News Tags:Alter, Attacks, Automated, Configurations, Exploit, Firewall, FortiCloud, Fortigate, SSO

Post navigation

Previous Post: Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
Next Post: New ClearFake Campaign Leveraging Proxy Execution to Run PowerShell Commands via Trusted Window Feature

Related Posts

Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool The Hacker News
40 npm Packages Compromised in Supply Chain Attack Using bundle.js to Steal Credentials The Hacker News
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers The Hacker News
Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS The Hacker News
Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar The Hacker News
Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks
  • Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
  • Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers
  • Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks
  • Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
  • Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers
  • Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark