HomeCyber BalkansHackers Targeting Internet-Connected Fortinet Firewalls with Zero-Day Vulnerability

Hackers Targeting Internet-Connected Fortinet Firewalls with Zero-Day Vulnerability

Published on

spot_img

A recent cyber campaign has been identified targeting Fortinet FortiGate firewall devices with exposed management interfaces across the public internet. This malicious activity, monitored by Arctic Wolf between November and December 2024, takes advantage of a suspected zero-day vulnerability, enabling unauthorized access and manipulation of critical network security infrastructure.

The attack unfolded in a series of phases, affecting devices operating on firmware versions 7.0.14 to 7.0.16. The campaign consisted of four distinct stages: Vulnerability Scanning, Reconnaissance, SSL VPN Configuration, and Lateral Movement.

During the initial phase, threat actors conducted vulnerability scans utilizing the jsconsole command-line interface. To obfuscate their actions, they employed unconventional or spoofed IP addresses, including loopback addresses and public DNS resolvers.

The reconnaissance phase focused on testing administrative privileges through initial configuration alterations. Subsequently, during the SSL VPN configuration phase, attackers either established new super admin accounts or took control of existing ones to escalate their network infiltration.

In the later stages of the attack, the threat actors utilized their administrative access to employ the DCSync technique, extracting credentials that provided them with deeper access to sensitive account information.

Lead threat intelligence researcher at Arctic Wolf, Stefan Hostetler, remarked on the situation, stating, “The observed pattern of activity aligns with widespread, opportunistic exploitation, as each victim organization experienced numerous malicious login events on Fortinet firewall devices.”

Although the specific vulnerability remains unconfirmed, security experts strongly lean towards categorizing it as a zero-day flaw due to the rapid sequence of attacks affecting multiple organizations and firmware versions.

The impact of this campaign has been significant, with dozens of organizations across diverse industries falling victim to the attack. Fortinet acknowledged the issue in a security advisory, acknowledging data exfiltration by threat actors, which included IP addresses, credentials, and configuration data from FortiGate devices managed by compromised FortiManager appliances.

To address this urgent threat, cybersecurity professionals are recommending organizations to take immediate measures, including disabling public management interface access, updating firmware to the latest stable versions, implementing multi-factor authentication for administrative accounts, monitoring for anomalous login activities, and conducting thorough threat hunting efforts to uncover potential compromises.

Fortinet has incorporated detections for this campaign into its Managed Detection and Response (MDR) platform to bolster protection for its clients. The company is actively investigating the matter and developing patches to address the vulnerabilities.

This incident underscores the critical need for safeguarding network management interfaces and restricting access to trusted internal users exclusively. As cyber threats evolve and become more sophisticated, organizations must stay alert and proactive in enhancing their security postures to defend against potential vulnerabilities, particularly those targeting essential network infrastructure elements like firewalls.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...