{"id":64,"date":"2026-02-26T15:11:02","date_gmt":"2026-02-26T15:11:02","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=64"},"modified":"2026-02-26T15:11:02","modified_gmt":"2026-02-26T15:11:02","slug":"ai-assisted-threat-actor-compromises-600-fortigate-devices-in-55-countries","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=64","title":{"rendered":"AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhJJ0OGjlNTnrjpx23D3iKXHFeEEDiGO2GRCI-o4SmtGRuXcl5S4rAcjOqOBrfuI1g8E_pj6UQjQP-R2qfAsV08Oukshw6Inq8fUK83I9sLd3LwnPyWazzaQ3yUghSA3UL0j-BNz0tn2dCEQsG3MpACZKSXoKnM6nhyphenhyphenf727_4S_f3L8EU3fxDc332_6Swkm\/s1700-e365\/FortiGate.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries.<\/p>\n<p>That&#8217;s according to new findings from Amazon Threat Intelligence, which said it observed the activity between January 11 and February 18, 2026.<\/p>\n<p>\u00abNo exploitation of FortiGate vulnerabilities was observed\u2014instead, this campaign succeeded by exploiting exposed management ports and weak credentials with single-factor authentication, fundamental security gaps that AI helped an unsophisticated actor exploit at scale,\u00bb CJ Moses, Chief Information Security Officer (CISO) of Amazon Integrated Security, <a href=\"https:\/\/aws.amazon.com\/blogs\/security\/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale\/\" rel=\"noopener\" target=\"_blank\">said<\/a> in a report.<\/p>\n<p>The tech giant described the threat actor as having limited technical capabilities, a constraint they overcame by relying on multiple commercial generative AI tools to implement various phases of the attack cycle, such as tool development, attack planning, and command generation.<\/p>\n<p>While one AI tool served as the primary backbone of the operation, the attackers also relied on a second AI tool as a fallback to assist with pivoting within a specific compromised network. The names of the AI tools were not disclosed.<\/p>\n<p>The threat actor is assessed to be driven by financial gain and not associated with any advanced persistent threat (APT) with state-sponsored resources. As recently highlighted by Google, generative AI tools are being increasingly adopted by threat actors to scale and accelerate their operations, even if they don&#8217;t equip them with novel uses of the technology.<\/p>\n<p>If anything, the emergence of AI tools illustrates how capabilities that were once off-limits to novice or technically challenged threat actors are becoming increasingly feasible, further lowering the barrier to entry for cybercrime and enabling them to come up with comprehensive attack methodologies.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/sse-customer-awards-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg5Ij_-TeqFMEsRFzgRRFzSRlVK6oHCncN_eJ2fkOdsA_1tN9HQbAlEEife2Z2JUt1lPv4st5n9KZP84jGEYY9Up6BQ7QE-N5rs6OhzL5thxGzVxnMx3JH9cGRLi9S5Kl-iV5PgjBeTdkBLnv_inF8UUAo88iqdmgJuPIc_6qiPyUMXwFyZWbZvkZkcRXSw\/s728-e100\/gartner-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abThey are likely a financially motivated individual or small group who, through AI augmentation, achieved an operational scale that would have previously required a significantly larger and more skilled team,\u00bb Moses said.<\/p>\n<p>Amazon&#8217;s investigation into the threat actor&#8217;s activity has revealed that they have successfully compromised multiple organizations\u2019 Active Directory environments, extracted complete credential databases, and even targeted backup infrastructure, likely in a lead-up to ransomware deployment.<\/p>\n<p>What&#8217;s interesting here is that rather than devising ways to persist within hardened environments or those that had employed sophisticated security controls, the threat actor chose to drop the target altogether and move to a relatively softer victim. This indicates the use of AI as a way to bridge their skill gap for easy pickings.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>Amazon said it identified publicly accessible infrastructure managed by the attackers that hosted various artifacts pertinent to the campaign. This included AI-generated attack plans, victim configurations, and source code for custom tooling. The entire modus operandi is akin to an \u00abAI-powered assembly line for cybercrime,\u00bb the company added.<\/p>\n<p>At its core, the attacks enabled the threat actor to breach FortiGate appliances, allowing it to extract full device configurations that, in turn, made it possible to glean credentials, network topology information, and device configuration information.<\/p>\n<p>This involved systematic scanning of FortiGate management interfaces exposed to the internet across ports 443, 8443, 10443, and 4443, followed by attempts to authenticate using commonly reused credentials. The activity was sector-agnostic, indicating automated mass scanning for vulnerable appliances. The scans originated from the IP address <a href=\"https:\/\/www.virustotal.com\/gui\/ip-address\/212.11.64.250\/detection\" rel=\"noopener\" target=\"_blank\">212.11.64[.]250<\/a>.<\/p>\n<p>The stolen data was then used to burrow deeper into targeted networks and conduct post-exploitation activities, including reconnaissance for vulnerability scanning using Nuclei, Active Directory compromise, credential harvesting, and efforts to access backup infrastructure that align with typical ransomware operations.<\/p>\n<p>Data gathered by Amazon shows that the scanning activity resulted in organizational-level compromise, causing multiple FortiGate devices belonging to the same entity to be accessed. The compromised clusters have been detected across South Asia, Latin America, the Caribbean, West Africa, Northern Europe, and Southeast Asia.<\/p>\n<p>\u00abFollowing VPN access to victim networks, the threat actor deploys a custom reconnaissance tool, with different versions written in both Go and Python,\u00bb the company said.<\/p>\n<p>\u00abAnalysis of the source code reveals clear indicators of AI-assisted development: redundant comments that merely restate function names, simplistic architecture with disproportionate investment in formatting over functionality, naive JSON parsing via string matching rather than proper deserialization, and compatibility shims for language built-ins with empty documentation stubs.\u00bb<\/p>\n<p>Some of the other steps undertaken by the threat actor following the reconnaissance phase are listed below &#8211;<\/p>\n<ul>\n<li>Achieve domain compromise via <a href=\"https:\/\/www.semperis.com\/blog\/dcsync-attack\/\" rel=\"noopener\" target=\"_blank\">DCSync attacks<\/a>.<\/li>\n<li>Move laterally across the network via pass-the-hash\/pass-the-ticket attacks, NTLM relay attacks, and remote command execution on Windows hosts.<\/li>\n<li>Target Veeam Backup &amp; Replication servers to deploy credential harvesting tools and programs aimed at exploiting known Veeam vulnerabilities (e.g., CVE-2023-27532 and CVE-2024-40711).<\/li>\n<\/ul>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ztw-hands-on-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhC66R4wPZ8qksTJukqlCCmrHCUX65DnpWW1nKnkOhy0Poe219tacbU6h09qEfUgRHxoObBazf3SVJ4OAd_iVd0EFecj-vskZSfroQ7rh0XyxQd6Ep_zNgqDW95YU4zG1Gpin8rHPK8Rqu_1KV7tf-G-7JJhxOVHhRJDWnj0qfq82uZSAvAG2rxK-Fe5fwd\/s728-e100\/ThreatLocker-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Another noteworthy finding is the threat actor&#8217;s pattern of repeatedly running into failures when trying to exploit anything beyond the \u00abmost straightforward, automated attack paths,\u00bb with their own documentation recording that the targets had either patched the services, closed the required ports, or had no vulnerable exploitation vectors.<\/p>\n<p>With Fortinet appliances becoming an attractive target for threat actors, it&#8217;s essential that organizations ensure management interfaces are not exposed to the internet, change default and common credentials, rotate SSL-VPN user credentials, implement multi-factor authentication for administrative and VPN access, and audit for unauthorized administrative accounts or connections.<\/p>\n<p>It&#8217;s also recommended to isolate backup servers from general network access, ensure all software programs are up-to-date, and monitor for unintended network exposure.<\/p>\n<p>\u00abAs we expect this trend to continue in 2026, organizations should anticipate that AI-augmented threat activity will continue to grow in volume from both skilled and unskilled adversaries,\u00bb Moses said. \u00abStrong defensive fundamentals remain the most effective countermeasure: patch management for perimeter devices, credential hygiene, network segmentation, and robust detection for post-exploitation indicators.\u00bb<\/p>\n<h3>Update<\/h3>\n<p>In a separate research, Cyber and Ramen also <a href=\"https:\/\/cyberandramen.net\/2026\/02\/21\/llms-in-the-kill-chain-inside-a-custom-mcp-targeting-fortigate-devices-across-continents\/\" rel=\"noopener\" target=\"_blank\">disclosed<\/a> details of the same campaign, highlighting the threat actor&#8217;s use of DeepSeek and Anthropic Claude to generate the attack plans. A prior exposure of the same server in December 2025 has revealed that the earlier instance hosted a copy of an offensive AI framework known as HexStrike AI.<\/p>\n<p>\u00abDeepSeek is used to generate attack plans from reconnaissance data,\u00bb an anonymous threat researcher behind the security blog said. \u00abClaude&#8217;s coding agent produced vulnerability assessments during the intrusions and was configured to execute offensive tools on the victim systems. A previously unreported model context protocol (MCP) server acts as a bridge to the language models, maintaining a knowledge base which grows with each target.\u00bb<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxCURaL0Wbs7edwTBPdUgwR0SfgHr4zYwyi8au3ukBHka1NBa6IUiYlaf2rR-y9TMpJLy5E2HhGMZp5xjeciLOhaDremHq2eFvJZMSq9rk9sYEsZzSyj69tS-oSDyXLkOhjDAN9_tJI7HXd1iYthrCWOaC4ragr-L2aeQP6qM5jJ361ytiNRmADAghpE-9\/s1700-e365\/recon.webp\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhxCURaL0Wbs7edwTBPdUgwR0SfgHr4zYwyi8au3ukBHka1NBa6IUiYlaf2rR-y9TMpJLy5E2HhGMZp5xjeciLOhaDremHq2eFvJZMSq9rk9sYEsZzSyj69tS-oSDyXLkOhjDAN9_tJI7HXd1iYthrCWOaC4ragr-L2aeQP6qM5jJ361ytiNRmADAghpE-9\/s1700-e365\/recon.webp\" alt=\"\" border=\"0\" data-original-height=\"1356\" data-original-width=\"2738\"\/><\/a><\/div>\n<p>The server, 212.11.64[.]250, has been found to host over 1,400 files across 139 subdirectories. This included CVE exploit code, FortiGate configuration files, Nuclei scanning templates, Veeam credential extraction tools, and BloodHound collection data.<\/p>\n<p>Also present among the exposed files was a custom Model Context Protocol (MCP) server named ARXON to process scan results and reconnaissance data, invoke DeepSeek to generate attack plans, and leverage scripts to modify victim infrastructure. Another custom tool used by the attacker is a Go-based orchestrator called CHECKER2 for parallel VPN scanning and target processing.<\/p>\n<p>\u00abWhat sets this activity apart is the integration of LLMs: a (likely) single operator managing simultaneous intrusions across multiple countries with analytical support at every stage,\u00bb the researcher said. \u00abLanguage models only assisted a low-to-average skilled actor in removing the number of targets one person can work at any given time.\u00bb<\/p>\n<p><em>(The story was updated after publication to include additional details of the campaign from Cyber and Ramen.)<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise over 600 FortiGate devices located in 55 countries. That&#8217;s according&hellip;<\/p>\n","protected":false},"author":1,"featured_media":65,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[172,170,173,8,175,174,171],"class_list":["post-64","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-actor","tag-aiassisted","tag-compromises","tag-countries","tag-devices","tag-fortigate","tag-threat"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/64","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=64"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/64\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/65"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}