Skip to main content

AI Campaign Hits FortiGate — 600+ Firewalls Compromised Worldwide

Severity: Critical (Mass Scale)
Target: FortiGate Firewalls
Scope: 600+ Confirmed Devices in 55+ Countries
Root Cause: Public admin access + no MFA
Observed: Jan 11 – Feb 18, 2026
Fix: Management interface hardening + mandatory MFA
AI-assisted global campaign compromising 600+ exposed FortiGate firewalls across 55 countries due to public admin access and lack of MFA



Executive Summary

Between January 11 and February 18, 2026, an AI-assisted threat actor orchestrated one of the broadest opportunistic intrusion campaigns of the year. Using generative AI to automate scanning, credential probing, and configuration parsing, the attacker identified and compromised over 600 FortiGate devices with exposed administrative interfaces.

This was not a zero-day exploit — it was an industrial-scale abuse of internet exposure and weak authentication. Using AI to handle monotonous tasks, the actor turned automation into threat power.

This campaign is noteworthy not for its sophistication, but for its scale, efficiency, and tactical shift — a harbinger of how AI amplifies conventional attack vectors into mass compromise.


Threat Overview

Traditionally, high-impact intrusion campaigns required:

  • Custom tooling
  • Deep security expertise
  • Time-intensive research

This campaign broke that model.

Instead of designing a novel exploit, the actor used commercially available generative AI to write, orchestrate, and operationalize attack workflows that did:

  • Internet‐wide scanning for exposed management planes
  • Automated credential validation
  • Extraction of configuration and credential artifacts
  • Post-access data harvesting
  • Initial phases of lateral reconnaissance toward backup infrastructure

The focus was not stealth — it was automation throughput.


Technical Details

Attack Surface

FortiGate devices expose administrative services on:

  • HTTPS management (TCP/443)
  • Alternative HTTPS ports (TCP/8443, 10443, 4443)

The attacker performed wide reconnaissance across these ports to enumerate reachable admin interfaces.

AI-Generated Scripts

Analysis of recovered scripts revealed:

  • Structurally clean, verbose logic
  • Excessive explanatory comments (hallmark of AI generation)
  • Inefficient but functional iteration logic
  • Broad scanning functions without adaptive optimization

These scripts were not “expert quality” — they were AI-produced utility scripts that worked well enough at scale.

The AI was used for:

  • Rapid scanning script generation
  • Automated parsing of HTTP responses
  • Normalizing output into target lists

Authentication Abuse

Once a management interface was identified, credential probing began.

Key observations:

  • No exploitation of FortiOS core authentication code
  • No kernel or memory corruption
  • No custom exploit payloads

Instead, access was gained via:

  • Default credentials
  • Weak passwords
  • Credential stuffing from known leaks
  • Lack of Multi-Factor Authentication (MFA)

Instances with enforced MFA were skipped entirely.

Configuration Extraction

After logging in, the attacker harvested configuration data, focusing on:

  • SSL-VPN settings
  • User/Group credential blocks
  • LDAP/AD integration settings
  • IP addressing and routing maps
  • Administrative account structures

AI-assisted parsing was used to extract structured credential artifacts from semi-structured config files.


Evidence of Exploitation & Indicators

While no single public proof-of-concept (PoC) malware was identified, key telemetry and forensic indicators include:

  • Public management interface scans correlated with FortiOS UA strings
  • Multiple login attempts from the same IP ranges progressing to access
  • High-volume threshold breaches on admin login endpoints
  • Concurrent extraction of SSL-VPN credentials
  • Access patterns consistent with automated tooling rather than human interaction
  • Attempts to locate backup infrastructure after initial access

These indicators show rapid, non-targeted, volume-driven access attempts rather than precision attacks.


Impact Analysis

This campaign’s immediate impact is primarily reconnaissance and credential compromise, but the implications extend deeper:

  • Credential Harvesting: SSL-VPN credentials, admin account hashes, and other artifacts can be used for downstream attacks.
  • Network Mapping: Extracted network topology data enables lateral movement.
  • Backup Exposure: Identification of internal resources such as Veeam Backup & Replication servers signals intent to target backups in future ransomware phases.
  • Operational Exposure: Attackers may now have persistent knowledge of defensive infrastructure.

The campaign’s emphasis on pre-ransomware reconnaissance suggests future campaigns may leverage harvested data for:

  • Ransomware deployment
  • Lateral movement
  • Active Directory escalation

Attack Chain Breakdown

Phase Action
Reconnaissance AI-assisted scanning for exposed admin interfaces
Discovery Enumeration of reachable FortiGate portals
Credential Abuse Default/weak password authentication attempts
Access Successful admin login without MFA
Harvesting Extraction of config and credential data
Lateral Prep Target identification for backup systems and domain infrastructure

This mirrors a classic intrusion kill chain, but with AI accelerating each stage and lowering manpower requirements.


Mitigations

Immediate Actions

🔹 Remove public exposure of FortiGate admin UIs
Management interfaces should not be accessible directly from the internet.

🔹 Enforce Multi-Factor Authentication (MFA)
Blocking credential abuse at the authentication layer collapses this entire attack vector.

🔹 Rotate secrets
Assume exposure: rotate SSL-VPN credentials, admin passwords, and internal API tokens.

🔹 Monitor login anomalies
Watch for authentication from unusual sources, rapid credential testing, and repeated failed logins.

Strategic Hardening

🔹 Network segmentation
Isolate firewall management from broader network infrastructure.

🔹 Immutable backup protections
Ensure backup systems (e.g., Veeam) have deletion protections and multi-actor approval.

🔹 Config integrity monitoring
Alerts on abnormal config exports or admin login patterns.


Strategic Insights

This campaign demonstrates a shift in threat economics:

AI is not replacing skilled attackers — it is replacing low-skill repetitive work.
Attackers no longer need deep expertise to harvest exposed infrastructure.

Instead, they:

  • Train AI on scanning workflows
  • Use automated generation for tooling
  • Focus human effort on strategic objectives

This represents a danger not because the attacks are advanced — but because they are fast, scalable, and accessible.

The attacker doesn’t need to compromise every firewall.
They only need to find enough exposed ones to build leverage.

You are no longer defending against a person.

You are defending against a machine-assisted process that never tires and never stops scanning for weakness.


Conclusion

The FortiGate “AI Blitz” campaign is not about a technical breakthrough.

It is about operational acceleration.

It shows that automation is now a first-class threat tool, accelerating the exploitation of basic security gaps at global scale.

To defend in 2026:

  • Eliminate internet exposure
  • Enforce strict authentication
  • Assume compromise and rotate credentials
  • Harden backup infrastructure

Because attackers don’t need to be brilliant anymore — they just need to be faster than you.


Stay Alert. Stay Human. Stay Safe.
— ZyberWalls Research Team

Comments

Popular Posts

Digital Arrest: Hacking the Human Operating System

WhisperPair (CVE‑2025‑36911): Bluetooth Earbuds Vulnerability Explained

The "OLE Bypass" Emergency: CVE-2026-21509 Deep Dive