Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • 3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk
  • ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats
  • Fake Moltbot VS Code Extension Malware Found in Marketplace Attack
  • Meta Premium Subscriptions: Instagram, Facebook & WhatsApp AI Plans
  • Malicious Chrome Extensions Driving Chrome Web Store Phishing
  • Windows 11 Boot Failure January 2026 Update: Microsoft Investigates
  • Cybersecurity Weekly Report: Jan 18-24 Threats
  • 149 Million Passwords Exposed Online in Massive Infostealer Malware Leak
Tuesday, February 3
Cyber infosCyber infos
X (Twitter) Instagram LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infosCyber infos
Data breaches

FortiGate Firewall Hacked in Automated Attacks Stealing Configuration Data (2026)

Cyber infosBy Cyber infosJanuary 23, 2026No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Email WhatsApp Copy Link
Follow Us
X (Twitter) Instagram LinkedIn WhatsApp Telegram Threads
Share
Facebook Twitter Pinterest Threads Copy Link

A widespread FortiGate firewall hacked campaign is actively unfolding, as threat actors carry out automated attacks designed to steal sensitive configuration data from exposed devices. Since January 15, 2026, security teams have observed attackers gaining unauthorized administrative access, exporting firewall configurations, and quietly creating new accounts to retain long-term control.

This FortiGate firewall attack in 2026 is especially concerning because it closely mirrors activity first seen in December 2025, shortly after Fortinet disclosed critical authentication bypass vulnerabilities related to FortiCloud single sign-on (SSO). Researchers warn that even organizations that patched promptly may still be exposed if attackers established persistence before remediation.

Table of Contents hide
1 Incident Details and Timeline
2 Who Is Affected in FortiGate Firewall Hacked
3 What Data and Systems Were Compromised
4 Technical Details of the Attack
5 Indicators of Compromise (IOCs)
6 Current Status and Response
7 What Fortinet Users Should Do
8 Expert Analysis and Implications
9 Company and Official Statements
10 Frequently Asked Questions (FAQ)
11 Final Thoughts

Incident Details and Timeline

Threat intelligence from Arctic Wolf shows that the latest wave of activity began in mid-January and follows a highly consistent, automated pattern. In many cases, attackers completed multiple stages of compromise in seconds, leaving little opportunity for defenders to intervene.

This Fortinet FortiGate security breach activity closely follows Fortinet’s December 2025 disclosure of two critical vulnerabilities:

  • CVE-2025-59718 – Unauthenticated SAML SSO bypass
  • CVE-2025-59719 – Unauthenticated SAML SSO bypass

These flaws affect systems running FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager when FortiCloud SSO authentication is enabled.

In a recent update, Fortinet confirmed active exploitation of a FortiCloud SSO authentication bypass vulnerability, though it has not yet stated whether the January incidents rely on the same CVEs or on a modified or patched attack technique.

Who Is Affected in FortiGate Firewall Hacked

While Fortinet has not published official victim numbers, Arctic Wolf telemetry suggests that the FortiGate automated cyber attacks are impacting organizations across multiple regions, including North America, Europe, and Asia-Pacific.

  • Enterprises operating internet-facing FortiGate firewalls
  • Managed service providers (MSPs)
  • Financial and professional services firms
  • Technology companies with remote management enabled

Any organization with insufficiently restricted administrative access is at increased risk of FortiGate admin account compromise.

What Data and Systems Were Compromised

The attackers’ primary goal appears to be FortiGate configuration data theft. Stolen configuration files can contain:

  • Firewall rules and access policies
  • VPN configurations and credentials
  • Administrative and hashed passwords
  • Certificates, API keys, and internal network details

Security experts caution that once attackers obtain this information, they gain a detailed blueprint of an organization’s internal environment. This significantly increases the risk of follow-on attacks, even if the original vulnerability is later patched.

FortiGate Firewall Hacked in Automated Attacks Stealing Configuration Data (2026)

Technical Details of the Attack

Initial Access: FortiGate SSO Login Bypass Attack

According to Arctic Wolf, attackers initiate FortiGate SSO login bypass attacks from a small set of hosting provider IP addresses. One of the most frequently observed login accounts is:

  • cloud-init@mail[.]io

This access pattern strongly resembles earlier exploitation tied to CVE-2025-59718 and CVE-2025-59719, although investigators have not yet confirmed whether the same flaws are being reused.

Exfiltration: Configuration Data Theft

Immediately after successful authentication, attackers trigger a FortiGate configuration export using the device’s graphical management interface. The configuration file is then downloaded to the same external IP address used for the login, minimizing noise and avoiding additional infrastructure.

Persistence: Administrative Account Creation

To ensure continued access, attackers create multiple secondary administrator accounts. Commonly observed usernames include:

  • secadmin
  • itadmin
  • support
  • backup
  • remoteadmin
  • audit

Log analysis shows almost no delay between login, configuration export, and account creation, confirming the use of automated FortiGate exploitation scripts.

Indicators of Compromise (IOCs)

Organizations should urgently review FortiGate logs for the following FortiGate firewall IOC indicators:

Malicious Accounts

  • cloud-init@mail[.]io
  • cloud-noc@mail[.]io

Source IP Addresses

  • 104.28.244[.]115
  • 104.28.212[.]114
  • 217.119.139[.]50
  • 37.1.209[.]19

Unauthorized Admin Accounts

  • secadmin, itadmin, support, backup, remoteadmin, audit

Current Status and Response

Arctic Wolf has enabled detections related to this Fortinet firewall vulnerability exploitation and is actively alerting customers when suspicious FortiGate activity is detected. Fortinet has acknowledged real-world exploitation and continues to issue updates through its PSIRT advisories.

However, the company has not yet confirmed whether existing patches fully mitigate this specific wave of attacks, making defensive hardening and threat hunting essential.

What Fortinet Users Should Do

  1. Apply all updates listed in Fortinet PSIRT security advisories.
  2. Hunt for known IOCs and review administrative activity logs.
  3. Reset all credentials if compromise is suspected, as exported password hashes can be cracked offline.
  4. Restrict FortiGate management access to trusted internal networks only.
  5. As a temporary mitigation, disable FortiCloud SSO if it is not required:
config system global
set admin-forticloud-sso-login disable
end

Expert Analysis and Implications

Security analysts note that this Fortinet FortiGate security breach highlights a growing shift toward identity-based attacks against perimeter infrastructure. Rather than deploying ransomware, attackers are quietly harvesting configuration data and maintaining access, increasing the likelihood of future, more damaging intrusions.

The high level of automation suggests that mass exploitation will continue as long as exposed FortiGate devices remain reachable from the internet.

Company and Official Statements

Fortinet stated that it is “actively investigating reports of exploitation involving FortiCloud SSO” and reiterated that customers should apply all available patches and follow hardening best practices.

Arctic Wolf warned that organizations should assume compromise if unexplained FortiGate administrative logins or configuration exports are discovered.

Frequently Asked Questions (FAQ)

1. Is this a ransomware attack?
No. There is no evidence of ransomware. The attackers are focused on access and configuration data.

2. Can patched systems still be affected?
Yes. Devices may remain compromised if attackers created persistence accounts before patching.

3. Are other Fortinet products at risk?
Products affected by the same SSO vulnerabilities, including FortiWeb and FortiProxy, may also be impacted.

Final Thoughts

The ongoing FortiGate firewall hacked campaign underscores the importance of continuous monitoring, strict access controls, and proactive threat hunting. Cyber Infos will continue tracking this FortiGate firewall attack in 2026 and publish verified updates as more information becomes available.

Organizations should act decisively now—before stolen firewall configuration data is leveraged for deeper and more damaging attacks.

Follow on X (Twitter) Follow on Instagram Follow on LinkedIn Follow on WhatsApp Follow on Threads
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleKernel Driver Ransomware Attack Uses Weaponized Signed Drivers to Disable EDR
Next Article AiTM Phishing Campaign Exploits SharePoint for BEC Attacks
Cyber infos
  • Website

Related Posts

Malicious Chrome Extensions Driving Chrome Web Store Phishing

January 27, 2026
Read More

149 Million Passwords Exposed Online in Massive Infostealer Malware Leak

January 25, 2026
Read More

AiTM Phishing Campaign Exploits SharePoint for BEC Attacks

January 24, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk

January 30, 2026

ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats

January 30, 2026

Windows 11 Boot Failure January 2026 Update: Microsoft Investigates

January 26, 2026

149 Million Passwords Exposed Online in Massive Infostealer Malware Leak

January 25, 2026

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

mobile security

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Archives
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

3,280,081 Fortinet Devices Online With Exposed Web Properties Under Risk

January 30, 2026

ClawdBot AI (Moltbot) Security Risks: Autonomous AI Agent Threats

January 30, 2026

Fake Moltbot VS Code Extension Malware Found in Marketplace Attack

January 29, 2026

Meta Premium Subscriptions: Instagram, Facebook & WhatsApp AI Plans

January 28, 2026

Malicious Chrome Extensions Driving Chrome Web Store Phishing

January 27, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

Partners
White Hat Hub Partner
X (Twitter) Instagram Pinterest LinkedIn WhatsApp Threads
  • Contact us
  • Sitemaps
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.