Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/CyberSecurity News/FortiGate Firewalls Hacked by Automated Attacks to Ste
CyberSecurity News

FortiGate Firewalls Hacked by Automated Attacks to Ste

A new wave of automated attacks is actively targeting FortiGate firewall devices. Since January 15, 2026, threat actors have been observed executing unauthorized configuration changes, establishing...

Emy Elsamnoudy
Emy Elsamnoudy
January 22, 2026 2 Min Read
0 0

A new wave of automated attacks is actively targeting FortiGate firewall devices. Since January 15, 2026, threat actors have been observed executing unauthorized configuration changes, establishing persistence through generic accounts, and exfiltrating sensitive firewall configuration data.

Table Of Content

  • Attack Chain
  • Indicators of Compromise
  • Mitigations

This campaign echoes a December 2025 incident involving malicious SSO logins shortly after Fortinet disclosed critical vulnerabilities CVE-2025-59718 and CVE-2025-59719.

Arctic Wolf notes that initial access methods remain unconfirmed, but the tactics mirror prior SSO abuse. Detections are active, alerting customers to suspicious activity. Fortinet has yet to confirm if existing patches fully mitigate this wave.

In early December 2025, Fortinet issued FG-IR-25-647, detailing two critical authentication bypass flaws. Attackers craft malicious SAML messages to bypass SSO login when FortiCloud SSO is enabled.

CVE ID Description Severity Affected Products
CVE-2025-59718 Unauth SAML SSO bypass Critical FortiOS, FortiWeb, FortiProxy
CVE-2025-59719 Unauth SAML SSO bypass Critical FortiOS, FortiWeb, FortiSwitchManager

Post-disclosure, Arctic Wolf observed SSO logins on admin accounts, followed by config dumps and persistence. It’s unclear if the January attacks leverage the same flaws or patched variants.

Attack Chain

Arctic Wolf’s telemetry indicates that the attacks are highly automated, with multiple stages of the kill chain occurring within seconds of one another.

  1. Initial Access: Malicious SSO logins are initiated from specific hosting provider IP addresses. The primary account used for these intrusions is [email protected].
  2. Exfiltration: Immediately following the login, the attacker triggers a download of the system configuration file via the GUI interface to the same source IP.
  3. Persistence: To maintain access, the attackers create secondary administrative accounts. Common usernames observed include secadmin, itadmin, and remoteadmin.

Logs indicate that the time delta between the login, the configuration export, and the account creation is negligible, confirming the use of automated scripts.

Indicators of Compromise

Monitor these IOCs for signs of compromise:

IOC Type Description
cloud-init@mail[.]io Malicious account Used for logins and config exfiltration
cloud-noc@mail[.]io Malicious account Used for logins and config exfiltration
104.28.244[.]115 Source IP Observed in SSO logins and downloads
104.28.212[.]114 Source IP Observed in intrusions
217.119.139[.]50 Source IP Observed in intrusions
37.1.209[.]19 Source IP Observed in intrusions
secadmin Persistence acct Created post-access
itadmin Persistence acct Created post-access
support Persistence acct Created post-access
backup Persistence acct Created post-access
remoteadmin Persistence acct Created post-access
audit Persistence acct Created post-access

Mitigations

Fortinet users should monitor official advisories and apply patches promptly (upgrade guide). Reset all credentials if activity matches—hashed creds can be cracked offline.

Restrict management interfaces to trusted internal networks, a best practice against mass scans. As a workaround, disable FortiCloud SSO:

textconfig system global
set admin-forticloud-sso-login disable
end

Organizations should hunt for these IOCs and review FortiGate logs immediately.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEPatchThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Critical Node.js Binary-Parser Flaw Vulnerability Library

Next Post

CISA Warns: Cisco Unified CM 0- Vulnerability Exploited

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us