Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解主要信息。 文章讲的是亚马逊报告了一起网络攻击事件,攻击者利用多个生成式AI服务,在五周内入侵了600多个FortiGate防火墙,涉及55个国家。攻击者主要针对暴露的管理界面和弱密码,没有使用零日漏洞,而是用暴力破解。一旦入侵成功,他们就提取配置文件,并用AI工具自动化进一步的侦察活动。亚马逊指出,AI降低了攻击的技术门槛,建议管理员加强安全措施。 接下来,我需要将这些要点浓缩到100字以内。要包括攻击者、使用AI、入侵的数量和范围、方法(暴露界面和弱密码)、以及亚马逊的建议。 可能的结构是:俄罗斯黑客利用生成式AI,在五周内入侵600多个FortiGate防火墙,涉及55国。攻击者针对暴露管理界面和弱密码,提取配置并用AI自动化侦察。亚马逊指出AI降低了攻击门槛,并建议加强安全措施。 检查字数是否符合要求,并确保信息准确无误。 </think> 俄罗斯黑客利用生成式AI技术,在五周内入侵600多个FortiGate防火墙,影响55国。攻击者通过暴露管理界面和弱密码获取访问权限,并借助AI工具自动化网络侦察活动。亚马逊指出,此类攻击凸显AI如何降低网络犯罪的技术门槛,并建议加强MFA和防火墙安全措施。 2026-2-21 14:0:33 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

Hacker using AI

Amazon is warning that a Russian-speaking hacker used multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls across 55 countries in five weeks.

A new report by CJ Moses, CISO of Amazon Integrated Security, says that the hacking campaign occurred between January 11 and February 18, 2026, and did not rely on any exploits to breach Fortinet firewalls.

Instead, the threat actor targeted exposed management interfaces and weak credentials that lacked MFA protection, then used AI to help automate access to other devices on the breached network.

Wiz

Moses says the compromised firewalls were observed across South Asia, Latin America, the Caribbean, West Africa, Northern Europe, and Southeast Asia, among other regions.

An AI-powered hacking campaign

Amazon says it learned about the campaign after finding a server hosting malicious tools used to target Fortinet FortiGate firewalls.

As part of the campaign, the threat actor targeted FortiGate management interfaces exposed to the internet by scanning for services running on ports 443, 8443, 10443, and 4443. The targeting was reportedly opportunistic rather than against any specific industries.

Rather than exploiting zero-days, as we commonly see targeting FortiGate devices, the actor used brute-force attacks with common passwords to gain access to devices.

Once breached, the threat actor extracted the device's configuration settings, which include:

  • SSL-VPN user credentials with recoverable passwords
  • Administrative credentials
  • Firewall policies and internal network architecture
  • IPsec VPN configurations
  • Network topology and routing information

These configuration files were then parsed and decrypted using what appears to be AI-assisted Python and Go tools.

"Following VPN access to victim networks, the threat actor deploys a custom reconnaissance tool, with different versions written in both Go and Python," explained Amazon.

"Analysis of the source code reveals clear indicators of AI-assisted development: redundant comments that merely restate function names, simplistic architecture with disproportionate investment in formatting over functionality, naive JSON parsing via string matching rather than proper deserialization, and compatibility shims for language built-ins with empty documentation stubs." 

"While functional for the threat actor's specific use case, the tooling lacks robustness and fails under edge cases—characteristics typical of AI-generated code used without significant refinement."

These tools were used to automate reconnaissance on the breached networks by analyzing routing tables, classifying networks by size, running port scans using the open-source gogo scanner, identifying SMB hosts and domain controllers, and using Nuclei to look for HTTP services.

The researchers say that while the tools were functional, they commonly failed in more hardened environments.

Operational documentation written in Russian detailed how to use Meterpreter and mimikatz to conduct DCSync attacks against Windows domain controllers and extract NTLM password hashes from the Active Directory database. 

The campaign also specifically targeted Veeam Backup & Replication servers using custom PowerShell scripts, compiled credential-extraction tools, and attempted to exploit Veeam vulnerabilities.

On one of the servers found by Amazon (212[.]11.64.250), the threat actor hosted a PowerShell script named "DecryptVeeamPasswords.ps1" that was used to target the backup application.

As Amazon explains, threat actors often target backup infrastructure before deploying ransomware to prevent the restoration of encrypted files from backups.

The threat actors' "operational notes" also contained multiple references to trying to exploit various vulnerabilities, including CVE-2019-7192 (QNAP RCE), CVE-2023-27532 (Veeam information disclosure), and CVE-2024-40711 (Veeam RCE).

The report says that the attacker repeatedly failed when attempting to breach patched or locked-down systems, but instead of continuing to try to gain access, they moved on to easier targets.

While Amazon believes the threat actor has a low-to-medium skill set, that skill set was greatly amplified through the use of AI.

The researchers say the threat actor utilized at least two large language model providers throughout the campaign to:

  • Generate step-by-step attack methodologies
  • Develop custom scripts in multiple programming languages
  • Create reconnaissance frameworks
  • Plan lateral movement strategies
  • Draft operational documentation

In one instance, the actor reportedly submitted a full internal victim network topology, including IP addresses, hostnames, credentials, and known services, to an AI service and asked for help spreading further into the network.

Amazon says the campaign demonstrates how commercial AI services are lowering the barrier to entry for threat actors, enabling them to carry out attacks that would normally be outside their skill set.

The company recommends that FortiGate admins not expose management interfaces to the internet, ensure MFA is enabled, ensure VPN passwords are not the same as those for Active Directory accounts, and harden backup infrastructure.

Google recently reported that threat actors are abusing Gemini AI across all stages of cyberattacks, mirroring what Amazon observed in this campaign.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/amazon-ai-assisted-hacker-breached-600-fortigate-firewalls-in-5-weeks/
如有侵权请联系:admin#unsafe.sh