Close Menu
  • Home
  • Cyber security
    • Cybersecurity Tools
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Review
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
  • Cyberinfos
X (Twitter) LinkedIn WhatsApp
Trending
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
  • WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis
  • Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps
  • Cybersecurity Weekly Report: March 9 -15, 2026
  • AI-Powered Penetration Testing Tool: PentAGI Explained
  • Metasploit Pro 5.0.0 Released: New Exploits, AD CS Attacks & Tools
  • CrackArmor AppArmor Vulnerability Exposes 12M Linux Systems
  • FBI Wiretap Breach 2026: Surveillance Database Hacked
Friday, March 20
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Home
  • Cyber security
    • Cybersecurity Tools
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Review
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
  • Cyberinfos
Cyber infos
Data breaches

FortiGate Firewall Hacked in Automated Attacks Stealing Configuration Data (2026)

V DiwaharBy V DiwaharJanuary 23, 2026No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

A widespread FortiGate firewall hacked campaign is actively unfolding, as threat actors carry out automated attacks designed to steal sensitive configuration data from exposed devices. Since January 15, 2026, security teams have observed attackers gaining unauthorized administrative access, exporting firewall configurations, and quietly creating new accounts to retain long-term control.

This FortiGate firewall attack in 2026 is especially concerning because it closely mirrors activity first seen in December 2025, shortly after Fortinet disclosed critical authentication bypass vulnerabilities related to FortiCloud single sign-on (SSO). Researchers warn that even organizations that patched promptly may still be exposed if attackers established persistence before remediation.

Table of Contents hide
1 Incident Details and Timeline
2 Who Is Affected in FortiGate Firewall Hacked
3 What Data and Systems Were Compromised
4 Technical Details of the Attack
5 Indicators of Compromise (IOCs)
6 Current Status and Response
7 What Fortinet Users Should Do
8 Expert Analysis and Implications
9 Company and Official Statements
10 Frequently Asked Questions (FAQ)
11 Final Thoughts

Incident Details and Timeline

Threat intelligence from Arctic Wolf shows that the latest wave of activity began in mid-January and follows a highly consistent, automated pattern. In many cases, attackers completed multiple stages of compromise in seconds, leaving little opportunity for defenders to intervene.

This Fortinet FortiGate security breach activity closely follows Fortinet’s December 2025 disclosure of two critical vulnerabilities:

  • CVE-2025-59718 – Unauthenticated SAML SSO bypass
  • CVE-2025-59719 – Unauthenticated SAML SSO bypass

These flaws affect systems running FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager when FortiCloud SSO authentication is enabled.

In a recent update, Fortinet confirmed active exploitation of a FortiCloud SSO authentication bypass vulnerability, though it has not yet stated whether the January incidents rely on the same CVEs or on a modified or patched attack technique.

Who Is Affected in FortiGate Firewall Hacked

While Fortinet has not published official victim numbers, Arctic Wolf telemetry suggests that the FortiGate automated cyber attacks are impacting organizations across multiple regions, including North America, Europe, and Asia-Pacific.

  • Enterprises operating internet-facing FortiGate firewalls
  • Managed service providers (MSPs)
  • Financial and professional services firms
  • Technology companies with remote management enabled

Any organization with insufficiently restricted administrative access is at increased risk of FortiGate admin account compromise.

What Data and Systems Were Compromised

The attackers’ primary goal appears to be FortiGate configuration data theft. Stolen configuration files can contain:

  • Firewall rules and access policies
  • VPN configurations and credentials
  • Administrative and hashed passwords
  • Certificates, API keys, and internal network details

Security experts caution that once attackers obtain this information, they gain a detailed blueprint of an organization’s internal environment. This significantly increases the risk of follow-on attacks, even if the original vulnerability is later patched.

FortiGate Firewall Hacked in Automated Attacks Stealing Configuration Data (2026)

Technical Details of the Attack

Initial Access: FortiGate SSO Login Bypass Attack

According to Arctic Wolf, attackers initiate FortiGate SSO login bypass attacks from a small set of hosting provider IP addresses. One of the most frequently observed login accounts is:

  • cloud-init@mail[.]io

This access pattern strongly resembles earlier exploitation tied to CVE-2025-59718 and CVE-2025-59719, although investigators have not yet confirmed whether the same flaws are being reused.

Exfiltration: Configuration Data Theft

Immediately after successful authentication, attackers trigger a FortiGate configuration export using the device’s graphical management interface. The configuration file is then downloaded to the same external IP address used for the login, minimizing noise and avoiding additional infrastructure.

Persistence: Administrative Account Creation

To ensure continued access, attackers create multiple secondary administrator accounts. Commonly observed usernames include:

  • secadmin
  • itadmin
  • support
  • backup
  • remoteadmin
  • audit

Log analysis shows almost no delay between login, configuration export, and account creation, confirming the use of automated FortiGate exploitation scripts.

Indicators of Compromise (IOCs)

Organizations should urgently review FortiGate logs for the following FortiGate firewall IOC indicators:

Malicious Accounts

  • cloud-init@mail[.]io
  • cloud-noc@mail[.]io

Source IP Addresses

  • 104.28.244[.]115
  • 104.28.212[.]114
  • 217.119.139[.]50
  • 37.1.209[.]19

Unauthorized Admin Accounts

  • secadmin, itadmin, support, backup, remoteadmin, audit

Current Status and Response

Arctic Wolf has enabled detections related to this Fortinet firewall vulnerability exploitation and is actively alerting customers when suspicious FortiGate activity is detected. Fortinet has acknowledged real-world exploitation and continues to issue updates through its PSIRT advisories.

However, the company has not yet confirmed whether existing patches fully mitigate this specific wave of attacks, making defensive hardening and threat hunting essential.

What Fortinet Users Should Do

  1. Apply all updates listed in Fortinet PSIRT security advisories.
  2. Hunt for known IOCs and review administrative activity logs.
  3. Reset all credentials if compromise is suspected, as exported password hashes can be cracked offline.
  4. Restrict FortiGate management access to trusted internal networks only.
  5. As a temporary mitigation, disable FortiCloud SSO if it is not required:
config system global
set admin-forticloud-sso-login disable
end

Expert Analysis and Implications

Security analysts note that this Fortinet FortiGate security breach highlights a growing shift toward identity-based attacks against perimeter infrastructure. Rather than deploying ransomware, attackers are quietly harvesting configuration data and maintaining access, increasing the likelihood of future, more damaging intrusions.

The high level of automation suggests that mass exploitation will continue as long as exposed FortiGate devices remain reachable from the internet.

Company and Official Statements

Fortinet stated that it is “actively investigating reports of exploitation involving FortiCloud SSO” and reiterated that customers should apply all available patches and follow hardening best practices.

Arctic Wolf warned that organizations should assume compromise if unexplained FortiGate administrative logins or configuration exports are discovered.

Frequently Asked Questions (FAQ)

1. Is this a ransomware attack?
No. There is no evidence of ransomware. The attackers are focused on access and configuration data.

2. Can patched systems still be affected?
Yes. Devices may remain compromised if attackers created persistence accounts before patching.

3. Are other Fortinet products at risk?
Products affected by the same SSO vulnerabilities, including FortiWeb and FortiProxy, may also be impacted.

Final Thoughts

The ongoing FortiGate firewall hacked campaign underscores the importance of continuous monitoring, strict access controls, and proactive threat hunting. Cyber Infos will continue tracking this FortiGate firewall attack in 2026 and publish verified updates as more information becomes available.

Organizations should act decisively now—before stolen firewall configuration data is leveraged for deeper and more damaging attacks.

Related posts:

  1. Record 31.4 Tbps DDoS Attack Exposes AISURU/Kimwolf Botnet Power
  2. Discord Data Breach 2025: 1.5 TB Data Leak Exposes Millions of ID Photos
  3. Data Breaches 2025: The 10 Biggest Incidents and Lessons Learned
  4. SmarterMail Vulnerabilities Actively Exploited in Ransomware Attacks
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleKernel Driver Ransomware Attack Uses Weaponized Signed Drivers to Disable EDR
Next Article AiTM Phishing Campaign Exploits SharePoint for BEC Attacks
V Diwahar
  • Website
  • LinkedIn

I'm SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026
Read More

Cognizant TriZetto Breach Exposes Data of 3.4M Patients

March 8, 2026
Read More

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber News

Dell RecoverPoint Zero-Day Vulnerability Exploited by Chinese Hackers Since Mid-2024

February 18, 2026

Latest Alert: CVE-2025-68668 Exposes Critical n8n Security Flaw

January 6, 2026

Claude Artifacts ClickFix macOS Infostealer: Dangerous AI Malware Campaign

February 14, 2026

Lessons Learned from Mongobleed Vulnerability (CVE-2025-14847)

January 3, 2026

Chinese Threat Actors Exploiting Credentials in Spray Attacks

November 12, 2024

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis

March 17, 2026

Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps

March 17, 2026

Cybersecurity Weekly Report: March 9 -15, 2026

March 16, 2026

AI-Powered Penetration Testing Tool: PentAGI Explained

March 15, 2026
Pages
  • About us
  • Contact us
  • Cyberinfos
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.