Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FortiGate Firewalls Exploited by Cyber Attackers

FortiGate Firewalls Exploited by Cyber Attackers

Posted on March 10, 2026 By CWS

Cybersecurity experts are raising alarms about a recent campaign where cybercriminals are targeting FortiGate Next-Generation Firewall (NGFW) devices to infiltrate networks. This activity, detailed in a report by SentinelOne, involves exploiting newly revealed vulnerabilities or weak passwords to obtain configuration files rich with service account credentials and network topology data. The campaign particularly targets healthcare, government, and managed service provider environments.

Entry Points and Vulnerabilities

FortiGate appliances, which are integral to network security, have extensive access to the systems they protect. According to security researchers Alex Delamotte, Stephen Bromfield, Mary Braden Murphy, and Amey Patne, these devices often connect to authentication systems like Active Directory (AD) and Lightweight Directory Access Protocol (LDAP). This connectivity allows them to map user roles by correlating connection attributes with directory information, enhancing response times for security alerts.

However, these same features make FortiGate devices attractive targets for attackers. Exploiting known vulnerabilities such as CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858, or misconfigurations, attackers can gain unauthorized access. In a notable incident from November 2025, attackers breached a FortiGate appliance to create an administrative account called ‘support’ and established firewall policies that enabled unrestricted access across zones.

Credential Theft and Network Infiltration

After establishing a foothold, the attackers regularly verified the device’s accessibility, indicative of an Initial Access Broker (IAB) seeking to sell network access. By February 2026, an attacker extracted a configuration file containing encrypted LDAP credentials. SentinelOne reports that the attacker decrypted these credentials, using them to authenticate to the AD and enroll rogue devices, thereby extending their network access.

Subsequent network scanning led to the detection of the breach, halting further lateral movements. In another investigation in January 2026, attackers transitioned from firewall access to deploying remote access tools like Pulseway and MeshAgent, downloading malware via PowerShell from Amazon Web Services (AWS) to exfiltrate sensitive data.

Impact and Defensive Measures

The Java-based malware employed DLL side-loading to extract the NTDS.dit file and SYSTEM registry information to an external server. Although there was no evidence of credential misuse during this period, the potential for damage remains significant. NGFW appliances like FortiGate are pervasive due to their integrated security and management capabilities, making them lucrative targets for attackers ranging from espionage-focused state actors to financially driven cybercriminals.

Organizations must remain vigilant and ensure their FortiGate devices are regularly updated and properly configured to mitigate these risks. Enhanced monitoring and swift incident response protocols are essential in defending against such sophisticated cyber threats.

The Hacker News Tags:Active Directory, attack campaign, Cybersecurity, Fortigate, LDAP, Malware, network security, SentinelOne, service account credentials, Vulnerabilities

Post navigation

Previous Post: Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
Next Post: Microsoft Addresses 83 Security Vulnerabilities in March Update

Related Posts

Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account The Hacker News
Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion The Hacker News
LiteLLM Attack Exploits Developer Machines for Credentials LiteLLM Attack Exploits Developer Machines for Credentials The Hacker News
AI Automation Exploits, Telecom Espionage, Prompt Poaching & More AI Automation Exploits, Telecom Espionage, Prompt Poaching & More The Hacker News
FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant The Hacker News
Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services
  • Early Cyber Weapon ‘fast16’ Revealed by Researchers
  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Bio Bug Bounty for GPT-5.5 AI Safety
  • China’s GopherWhisper APT Exploits Legitimate Services
  • Early Cyber Weapon ‘fast16’ Revealed by Researchers
  • Microsoft Fixes Vulnerability in Entra Agent ID Administration
  • CISA Highlights New Security Flaws, Sets 2026 Deadline

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark