Incident responders at SentinelOne recently identified multiple attacks targeting Fortinet firewall appliances exposed to the internet.
In these incidents, attackers exploited weaknesses in Fortinet’s Single Sign-On (SSO) mechanisms to retrieve sensitive configuration data and pivot deeper into internal environments.
Threat actors are primarily abusing several FortiGate vulnerabilities, including CVE-2025-59718, CVE-2025-59719, and the recently patched CVE-2026-24858.
These flaws allow unauthorized users to bypass authentication controls and gain administrative-level access to vulnerable firewall devices.
Once access is obtained, attackers execute a simple command that downloads the firewall’s full configuration file.
The extracted configuration file contains critical operational data, including service account credentials used to authenticate against enterprise services.
FortiOS configuration files rely on reversible encryption, which enables attackers to decrypt the stored credentials with relative ease.
This exposes sensitive authentication details, including LDAP and Active Directory service account credentials, allowing attackers to authenticate directly to the domain infrastructure.
In addition to exploiting vulnerabilities, investigators observed attackers scanning exposed FortiGate devices and attempting logins using weak or default credentials, indicating a combination of vulnerability exploitation and brute-force tactics.
Security researchers identified two separate intrusion campaigns following the initial compromise of FortiGate devices.
In the first campaign, active between late 2025 and February 2026, attackers created a malicious local administrator account named “support” on compromised firewalls.
Using stolen LDAP service account credentials, the attackers leveraged default Active Directory configurations to join two rogue workstations to the domain.
By registering these attacker-controlled machines within the network, the threat actors gained expanded access while avoiding certain security restrictions typically applied to external systems.
The compromised machines were then used to conduct network reconnaissance and credential attacks.
Investigators observed attackers performing large-scale password spraying and network enumeration using SoftPerfect Network Scanner to identify additional targets and weak accounts.
A second incident observed in January 2026 followed a more aggressive post-exploitation path. Attackers created another malicious firewall account named “ssl-admin” and quickly escalated privileges by compromising a Domain Administrator account.
Within minutes, the attackers deployed legitimate Remote Monitoring and Management (RMM) tools, including Pulseway and MeshAgent, to maintain remote access to the compromised environment.
To evade detection, the malicious payloads were disguised as Java software updates. Attackers hosted these payloads on trusted cloud services such as Google Cloud Storage and Amazon Web Services S3 buckets, allowing the activity to blend with normal network traffic.
The attackers ultimately extracted the NTDS.dit database, the core repository containing all Active Directory credentials and secrets, using Volume Shadow Copy backups.
Additionally, Windows registry values were modified to conceal the presence of the installed remote management tools.
Investigators highlighted poor log retention practices as a recurring factor in many of the incidents. In several cases, firewall logs had been overwritten before security teams could identify the original compromise.
Security experts recommend several defensive actions:
Improving visibility and log retention across edge devices can significantly reduce attacker dwell time and enable faster incident detection.
Domains
IP Addresses
Malicious URLs
Threat Actor Accounts
Suspicious Windows Hostnames
Organizations using FortiGate devices are urged to review firewall configurations, monitor authentication activity, and immediately patch vulnerable systems to prevent similar intrusions.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Hackers Exploit FortiGate Firewalls in Widespread Attacks to Steal Network Credentials appeared first on Cyber Security News.
Through videos circulating among Senegalese friends in WhatsApp chats, I watched the October 21 ICE…
Through videos circulating among Senegalese friends in WhatsApp chats, I watched the October 21 ICE…
EllaMae.xyz – Squarespace customer – (United States) The .xyz community includes brands and independent retailers…
EllaMae.xyz – Squarespace customer – (United States) The .xyz community includes brands and independent retailers…
Jim Jarmusch—the director of Stranger Than Paradise, Down by Law, and Dead Man—recently stepped into…
A North Korea-linked hacking group known as WaterPlum has introduced a dangerous new malware called…
This website uses cookies.