{"id":7218,"date":"2026-02-24T03:49:40","date_gmt":"2026-02-24T03:49:40","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=7218"},"modified":"2026-02-24T03:49:40","modified_gmt":"2026-02-24T03:49:40","slug":"russian-group-uses-ai-to-exploit-weakly-protected-fortinet-firewalls-says-amazon","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=7218","title":{"rendered":"Russian group uses AI to exploit weakly-protected Fortinet firewalls, says Amazon"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>A Russian-speaking threat actor is using commercial generative AI services to compromise hundreds of Fortinet Fortigate firewalls, warns Amazon Threat Intelligence.<\/p>\n<p>Once on the network, the hackers successfully compromised Active Directory at hundreds of organizations, extracted complete credential databases, and targeted backup infrastructure \u2014 a potential precursor to ransomware deployment, the report adds.<\/p>\n<p>The report, by <a href=\"https:\/\/www.linkedin.com\/in\/cjmoses\/\" target=\"_blank\" rel=\"noopener\">CJ Moses<\/a>, CISO of Amazon Integrated Security, is another signal that commercial AI services are lowering the technical barrier to entry for offensive cyber capabilities.<\/p>\n<p>A single actor, or a very small group, generated its entire toolkit through AI-assisted development, Amazon says.<\/p>\n<p>But <a href=\"https:\/\/aws.amazon.com\/blogs\/security\/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale\/\" target=\"_blank\" rel=\"noopener\">the report<\/a> is also a reminder to CSOs and IT leaders of all organizations of something they have known for decades: Failure to implement cybersecurity basics will inevitably lead to a breach of security controls. The compromised Fortigate firewalls in this campaign are being exploited not through product flaws, but through exposed management ports and weak credentials with only single-factor authentication. A primary tool was the use of a list of commonly reused credentials, otherwise known as a brute-force attack. These were \u201cfundamental security gaps\u201d that allowed AI to help an unsophisticated actor exploit at scale, the Amazon report says.<\/p>\n<p>\u201cWhen this actor encountered hardened environments or more sophisticated defensive measures, they simply moved on to softer targets rather than persisting,\u201d says the report.<\/p>\n<p>\u201cStrong defensive fundamentals remain the most effective countermeasure,\u201d for similar attacks, Amazon stresses. This includes patch management for perimeter devices, credential hygiene, network segmentation, and robust detection of post-exploitation indicators.<\/p>\n<p><a href=\"https:\/\/www.forrester.com\/analyst-bio\/jeff-pollard\/BIO10584\" target=\"_blank\" rel=\"noopener\">Jeff Pollard<\/a>, a principle analyst at Forrester Research who leads research into the role of the CSO, noted that, unlike many other <a href=\"https:\/\/www.csoonline.com\/article\/4121682\/fortinet-confirms-new-zero-day-attacks-against-customer-devices.html\" target=\"_blank\" rel=\"noopener\">recent attacks on Fortinet<\/a>, this campaign has to do with the configuration of the devices, not software vulnerabilities in the platform itself.<\/p>\n<p>\u00a0\u201cIt\u2019s a case of needing to follow the basics and, if anything, makes those basics more important,\u201d he said. \u201cWhat\u2019s more interesting than the attack itself is the evidence that attackers used AI platforms to scale the attack to make it as far reaching as they did.<\/p>\n<h2 class=\"wp-block-heading\">AI amplifies impact<\/h2>\n<p>\u201cAI will do more than surface novel attacks,\u201d he added. \u201cIt will also amplify the impact of all attacks, as this attack demonstrates. It lowers the barrier of entry to attackers and also ups the potential consequences of attacks at the same time. That\u2019s not a combination IT, developers, or security practitioners needed, but alas, here we are.\u201d<\/p>\n<p>\u00a0The Amazon report comes on the heels of one from Palo Alto Networks that looked at 750 incidents <a href=\"https:\/\/www.csoonline.com\/article\/4133342\/cyber-attacks-enabled-by-basic-failings-palo-alto-analysis-finds.html\" target=\"_blank\" rel=\"noopener\">and came to the same conclusion<\/a>: \u00a0what is really killing organizations isn\u2019t so much AI, but their basic security failings such as weak authentication, a lack of real-time visibility, and misconfigurations caused by a complex sprawl of security systems.<\/p>\n<p>Amazon Threat Intelligence found that the Russian-speaking threat actor had been able to compromise over 600 FortiGate devices across more than 55 countries between January 11 and\u00a0 February 18, all without exploiting any vulnerabilities. Instead it used unnamed commercial AI services, excluding AWS, to hack into weakly-protected FortiGate devices. AI just helped scale the attack.<\/p>\n<p>\u201cThe threat actor in this campaign is not known to be associated with any advanced persistent threat group with state-sponsored resources,\u201d the report says. \u201cThey are likely a financially motivated individual or small group who, through AI augmentation, achieved an operational scale that would have previously required a significantly larger and more skilled team.\u201d<\/p>\n<p>The gang also isn\u2019t (or perhaps until now, wasn\u2019t) smart: It left operational files including AI-generated attack plans, victim configurations, and source code for custom tooling on the publicly-accessible IT infrastructure that was hosting its attacks.<\/p>\n<p>\u201cIt\u2019s like an AI-powered assembly line for cybercrime, helping less skilled workers produce at scale,\u201d Amazon researchers said.<\/p>\n<p>After stealing admin credentials, firewall policies, network topology, and routing information, as well as IPsec VPN peer configurations, the threat actor used AI-assisted Python scripts to parse, decrypt, and organize these stolen configurations.<\/p>\n<p>Following achieving VPN access to victim networks, Amazon says the threat actor deploys a custom network reconnaissance tool, with different versions written in both Go and Python. Analysis of the source code reveals clear indicators of AI-assisted development such as redundant comments that merely restate function names, simplistic architecture with disproportionate investment in formatting over functionality, naive JSON parsing via string matching rather than proper deserialization, and compatibility shims for language built-ins with empty documentation stubs. While functional for the threat actor\u2019s specific use case, the tooling lacks robustness and fails under edge cases, characteristics, Amazon says, typical of AI-generated code used without significant refinement.<\/p>\n<h2 class=\"wp-block-heading\">Recommendations<\/h2>\n<p>The Amazon report makes a number of recommendations to network admins with FortiGate devices. They include ensuring device management interfaces aren\u2019t exposed to the internet, or, if they have to be, restricting access to known IP ranges and using a bastion host or out-of-band management network. As basic cybersecurity demands, all default and common credentials for FortiGate appliances should be changed. They should ensure multifactor authentication is implemented for all admin and VPN access, and make sure there is no password reuse between FortiGate VPN credentials and Active Directory domain accounts.<\/p>\n<p>To avoid their systems being exploited, IT admins in firms using AWS are advised to enable Amazon GuardDuty for threat detection, monitoring for unusual API calls and credential usage patterns, use Amazon Inspector to automatically scan for software vulnerabilities and unintended network exposure, and use AWS Security Hub to maintain continuous visibility into their security posture.<\/p>\n<p><a href=\"https:\/\/futurumgroup.com\/fernando-montenegro\/\" target=\"_blank\" rel=\"noopener\">Fernando Montenegro<\/a>, cybersecurity practice lead at Futurum, said organizations are still coming to terms with the acceleration and augmentation that AI can bring to adversaries. In this case, he said, the threat researchers highlighted how adversaries likely leveraged AI capabilities to create crude but effective tools to support their campaign. This is the same kind of capability that allows a non-malicious user to \u2018vibe code\u2019 something for a narrow use case, but instead of a benign app, it\u2019s a malicious tool.<\/p>\n<h2 class=\"wp-block-heading\">Raises the bar for security<\/h2>\n<p>Organizations always deal with constraints that are not visible to outside observers, so \u2018implementing security basics\u2019 may, in many cases, not be a simple endeavor, he added. Most security teams deal with numerous competing priorities and limited budgets, and must constantly balance a mixture of new-initiative and steady-state operational activities.\u00a0<\/p>\n<p>\u201cWhat this incident, and others, are making abundantly clear is that the augmentation of attackers through AI is constantly and quickly raising the bar in what is considered acceptable security practices moving forward,\u201d he also said. \u201cThis will require organizations to spend more cycles making sure that these weaker security practices be quickly removed from their environment, lest they fall prey to nimble(r) attackers.\u201d<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:7430712207493013504\/?originTrackingId=R9zEU2WtHae%2BGr2XMiH%2FvA%3D%3D\" target=\"_blank\" rel=\"noopener\">In a LinkedIn blog, <\/a>Amazon CISO Moses noted that organizations with strong credential hygiene, MFA, and proper network segmentation successfully blocked these attacks. \u201cAnd while AI is lowering the barrier to entry for attackers,\u201d he added, \u201cit\u2019s an equally powerful tool for defenders, helping security teams detect threats faster, automate response at scale, and stay ahead of evolving tactics. As attack volumes grow from both skilled and unskilled adversaries, the same defensive basics that protected against this campaign will remain your most effective countermeasure.\u201d<\/p>\n<p>In response to questions from CSO, he added that the Russian group\u2019s success \u201cfundamentally demonstrates that threat actors often choose the path of least resistance. When basic security controls like multi-factor authentication, proper network segmentation, and credential management aren\u2019t in place, even unsophisticated actors can achieve strategic objectives at scale. The AI simply amplified their efficiency.\u201d<\/p>\n<p>Asked why IT leaders are still unable to implement cybersecurity basics, he said, \u201cThe challenge isn\u2019t knowledge, it\u2019s operating in resource-constrained environments where technical debt and competing business priorities create systematic gaps in foundational security. Legacy systems, budget constraints, and rapid digital transformation often force difficult trade-offs, but threat actors are now leveraging AI to exploit these exact vulnerabilities at machine speed. The path forward requires making security fundamentals so embedded that they become operationally resilient, even under resource pressure.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>A Russian-speaking threat actor is using commercial generative AI services to compromise hundreds of Fortinet Fortigate firewalls, warns Amazon Threat Intelligence. Once on the network, the hackers successfully compromised Active Directory at hundreds of organizations, extracted complete credential databases, and targeted backup infrastructure \u2014 a potential precursor to ransomware deployment, the report adds. The report, [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":7219,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-7218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7218"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7218"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7218\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/7219"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}