{"id":491935,"date":"2026-02-22T11:38:14","date_gmt":"2026-02-22T11:38:14","guid":{"rendered":"https:\/\/www.newsbeep.com\/ca\/491935\/"},"modified":"2026-02-22T11:38:14","modified_gmt":"2026-02-22T11:38:14","slug":"ai-assisted-hacker-breached-600-fortinet-firewalls-in-5-weeks","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/ca\/491935\/","title":{"rendered":"AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks"},"content":{"rendered":"<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"Hacker using AI\" height=\"900\" src=\"https:\/\/www.newsbeep.com\/ca\/wp-content\/uploads\/2026\/02\/hacker-using-ai.jpg\" width=\"1600\"\/><\/p>\n<p>Article updated at the bottom with additional technical details about this campaign.<\/p>\n<p>Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks.<\/p>\n<p>A new report by\u00a0CJ Moses, CISO\u00a0of Amazon Integrated Security, says that the hacking campaign occurred\u00a0between January 11 and February 18, 2026, and did not rely on any exploits to breach Fortinet firewalls.<\/p>\n<p> <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/ca\/wp-content\/uploads\/2026\/02\/ai-security-board-report-template.jpg\" alt=\"Wiz\" style=\"margin-top: 0px;\"\/><\/a><\/p>\n<p>Instead, the threat actor\u00a0targeted exposed management interfaces and weak credentials that lacked MFA protection, then used AI to help automate access to other devices on the breached network.<\/p>\n<p>Moses says the compromised firewalls were observed across South Asia, Latin America, the Caribbean, West Africa, Northern Europe, and Southeast Asia, among other regions.<\/p>\n<p>An AI-powered hacking campaign<\/p>\n<p>Amazon says it learned about the campaign after finding a server hosting malicious tools used to target Fortinet FortiGate firewalls.<\/p>\n<p>As part of the campaign, the threat actor targeted FortiGate management interfaces exposed to the internet by scanning for services running on ports 443, 8443, 10443, and 4443.\u00a0The targeting was reportedly opportunistic rather than against any specific industries.<\/p>\n<p>Rather than exploiting zero-days, as we <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-breach-fortinet-fortigate-devices-steal-firewall-configs\/\" target=\"_blank\" rel=\"nofollow noopener\">commonly see targeting FortiGate devices<\/a>, the actor used brute-force attacks with common passwords to gain access to devices.<\/p>\n<p>Once breached, the threat actor\u00a0extracted the device&#8217;s configuration settings, which include:<\/p>\n<p>SSL-VPN user credentials with recoverable passwords&#13;<br \/>\n\tAdministrative credentials&#13;<br \/>\n\tFirewall policies and internal network architecture&#13;<br \/>\n\tIPsec VPN configurations&#13;<br \/>\n\tNetwork topology and routing information&#13;<\/p>\n<p>These configuration files were then parsed and decrypted using what appears to be AI-assisted Python and Go tools.<\/p>\n<p>&#8220;Following VPN access to victim networks, the threat actor deploys a custom reconnaissance tool, with different versions written in both Go and Python,&#8221; <a href=\"https:\/\/aws.amazon.com\/blogs\/security\/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale\/\" target=\"_blank\" rel=\"nofollow noopener\">explained Amazon<\/a>.<\/p>\n<p>&#8220;Analysis of the source code reveals clear indicators of AI-assisted development: redundant comments that merely restate function names, simplistic architecture with disproportionate investment in formatting over functionality, naive JSON parsing via string matching rather than proper deserialization, and compatibility shims for language built-ins with empty documentation stubs.&#8221;\u00a0<\/p>\n<p>&#8220;While functional for the threat actor&#8217;s specific use case, the tooling lacks robustness and fails under edge cases\u2014characteristics typical of AI-generated code used without significant refinement.&#8221;<\/p>\n<p>These tools were used to automate\u00a0reconnaissance on the breached networks\u00a0by analyzing routing tables, classifying networks by size, running port scans using the open-source <a href=\"https:\/\/github.com\/chainreactors\/gogo\" target=\"_blank\" rel=\"nofollow noopener\">gogo scanner<\/a>, identifying SMB hosts and domain controllers, and using Nuclei to look for HTTP services.<\/p>\n<p>The researchers say\u00a0that while the tools were functional, they commonly failed in more hardened environments.<\/p>\n<p>Operational documentation written in Russian detailed how to use Meterpreter and mimikatz to conduct DCSync attacks against Windows domain controllers and\u00a0extract NTLM password hashes from the Active Directory database.\u00a0<\/p>\n<p>The campaign also specifically targeted Veeam Backup &amp; Replication servers using custom PowerShell scripts, compiled credential-extraction tools, and attempted to exploit Veeam vulnerabilities.<\/p>\n<p>On one of the servers found by Amazon (212[.]11.64.250), the threat actor hosted a PowerShell script named &#8220;<a href=\"https:\/\/www.virustotal.com\/gui\/url\/c23d34fede1a013b7a98d43ba60907beb3a051e6750e7410fafe9e198dc14696\" target=\"_blank\" rel=\"nofollow noopener\">DecryptVeeamPasswords.ps1<\/a>&#8221; that was used to target the backup application.<\/p>\n<p>As Amazon explains, threat actors often target backup infrastructure before deploying ransomware to prevent the restoration of encrypted files from backups.<\/p>\n<p>The threat actors&#8217; &#8220;operational notes&#8221; also contained multiple references to trying to exploit\u00a0various vulnerabilities, including\u00a0<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2019-7192\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2019-7192<\/a> (QNAP RCE), <a href=\"https:\/\/www.veeam.com\/kb4424\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-27532<\/a> (Veeam information disclosure), and <a href=\"https:\/\/www.veeam.com\/kb4649\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2024-40711<\/a> (Veeam RCE).<\/p>\n<p>The report says that the attacker repeatedly failed when attempting to breach patched or locked-down systems, but instead of continuing to try to gain access, they moved on to easier targets.<\/p>\n<p>While Amazon believes the threat actor has a low-to-medium skill set, that skill set was greatly amplified through the use of AI.<\/p>\n<p>The researchers say the threat actor utilized at least two large language model providers throughout the campaign to:<\/p>\n<p>Generate step-by-step attack methodologies&#13;<br \/>\n\tDevelop custom scripts in multiple programming languages&#13;<br \/>\n\tCreate reconnaissance frameworks&#13;<br \/>\n\tPlan lateral movement strategies&#13;<br \/>\n\tDraft operational documentation&#13;<\/p>\n<p>In one instance, the actor reportedly submitted a full internal victim network topology, including IP addresses, hostnames, credentials, and known services, to an AI service and asked for help spreading further into the network.<\/p>\n<p>Amazon says the campaign demonstrates how commercial AI services are lowering the barrier to entry for threat actors, enabling them to carry out attacks that would normally be outside their skill set.<\/p>\n<p>The company recommends that FortiGate admins\u00a0not expose management interfaces to the internet, ensure MFA is enabled, ensure VPN passwords are not the same as those for Active Directory accounts, and harden backup infrastructure.<\/p>\n<p>Google <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-says-hackers-are-abusing-gemini-ai-for-all-attacks-stages\/\" target=\"_blank\" rel=\"nofollow noopener\">recently reported<\/a> that threat actors are abusing Gemini AI across all stages of cyberattacks, mirroring what Amazon observed in this campaign.<\/p>\n<p>Custom AI toolset powers breaches<\/p>\n<p>Separate research published yesterday on the <a href=\"https:\/\/cyberandramen.net\/2026\/02\/21\/llms-in-the-kill-chain-inside-a-custom-mcp-targeting-fortigate-devices-across-continents\/\" target=\"_blank\" rel=\"nofollow noopener\">Cyber and Ramen<\/a> security blog\u00a0provides additional technical details about how AI and large language models were incorporated directly into the intrusion campaign.<\/p>\n<p>The researcher shared that the misconfigured server at 212.11.64[.]250, also found by Amazon,\u00a0exposed 1,402\u00a0files, including stolen FortiGate configuration backups, Active Directory mapping data, credential dumps, vulnerability assessments, and attack planning documents.<\/p>\n<p>&#8220;The server at\u00a0212.11.64[.]250:9999, hosted on AS4264 (Global-Data System IT Corporation, Zurich, Switzerland), contained 1,402 files across 139 subdirectories,&#8221; explained the threat researcher.<\/p>\n<p>&#8220;Folders within the directory included CVE exploit code, FortiGate configuration files, Nuclei scanning templates and Veeam credential extraction tools. Two folders named\u00a0claude-0 and\u00a0claude contained over 200 files between the two, including Claude Code task outputs, session diffs, and cached prompt states.&#8221;<\/p>\n<p>&#8220;A folder titled fortigate_27.123(full IP redacted) held configuration data and credentials from what appeared to be a compromised FortiGate appliance.&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Hunt.io Attack Capture showing the contents of the threat actor's server\" height=\"600\" src=\"https:\/\/www.newsbeep.com\/ca\/wp-content\/uploads\/2026\/02\/hunt-attack-capture-open-directory.jpg\" width=\"1131\"\/>Hunt.io Attack Capture showing the contents of the threat actor&#8217;s server<br \/>Source:\u00a0Cyber and Ramen<\/p>\n<p>Included in the exposed files was a custom Model Context Protocol (MCP) server named ARXON, which acted as a bridge between reconnaissance data and commercial large language models. The researcher said they were unable to find any public references to ARXON, indicating it was likely a custom MCP framework created by the threat actor.<\/p>\n<p>An MCP server acts as an intermediary layer that ingests data, feeds it into language models, and then uses the generated output with other tools. In this campaign, the ingested data was used to automate post-compromise analysis and attack planning.<\/p>\n<p>A separate Go tool called CHECKER2 is a Docker-based orchestrator\u00a0that was used to scan thousands of VPN targets in parallel, with logs showing more than 2,500 potential targets across 100+ countries.\u00a0<\/p>\n<p>According to the researcher, reconnaissance data collected from compromised FortiGate appliances and internal networks was fed into ARXON, which then queried large language models such as DeepSeek and Claude to generate structured attack plans.<\/p>\n<p>These attack plans included instructions for gaining Domain Admin, suggested locations to search for credentials, recommended exploitation steps, and guidance on spreading laterally to other devices.<\/p>\n<p>In some cases, Claude Code was configured to execute offensive tools on its own, including Impacket scripts, Metasploit modules, and hashcat, without requiring the threat actor to approve each command.<\/p>\n<p>The researcher notes that the operation evolved over several weeks, with the attacker initially\u00a0using an open-source HexStrike MCP framework and, about eight weeks later, moving to the automated, customized ARXON system.<\/p>\n<p>This report\u00a0shares Amazon&#8217;s assessment that generative AI is being used as a multiplier, allowing attackers to scale intrusions more efficiently. The researcher similarly warns that defenders should prioritize patching edge devices and auditing unusual SSH activity and VPN account creation.<\/p>\n<p>CronUp security researcher <a href=\"http:\/\/x.com\/1ZRR4H\/status\/2024148893848453385\" target=\"_blank\" rel=\"nofollow noopener\">Germ\u00e1n Fern\u00e1ndez<\/a> also found a different server exposing a directory containing what appear to be AI-generated tools targeting FortiWeb.<\/p>\n<p>While these tools do not appear to be part of the FortiGate\u00a0campaign, they once again show how threat actors are continuing to use AI tools to power their attacks.<\/p>\n<p>Update 2\/21\/26: Added more technical details from Cyber and Ramen security blog and\u00a0Germ\u00e1n Fern\u00e1ndez.<\/p>\n<p>        <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored nofollow\"><br \/>\n            <img decoding=\"async\" alt=\"tines\" src=\"https:\/\/www.newsbeep.com\/ca\/wp-content\/uploads\/2026\/02\/tines-in-art-square.jpg\" class=\"b-lazy\"\/><\/a><\/p>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>        <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored nofollow\">Get the guide<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Article updated at the bottom with additional technical details about this campaign. Amazon is warning that a Russian-speaking&hellip;\n","protected":false},"author":2,"featured_media":491936,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[62,276,277,49,48,61],"class_list":{"0":"post-491935","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-ca","12":"tag-canada","13":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts\/491935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/comments?post=491935"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/posts\/491935\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/media\/491936"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/media?parent=491935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/categories?post=491935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/ca\/wp-json\/wp\/v2\/tags?post=491935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}