Russian-speaking hackers used gen AI tools to compromise 600 firewalls, Amazon says
好的,我需要帮用户总结这篇文章。首先,文章讲的是一个俄罗斯语的威胁行为者利用商业AI工具攻击了600多个Fortinet防火墙设备。攻击时间在1月到2月间,影响了55个国家。亚马逊的威胁情报团队指出,这次攻击并没有利用高级漏洞,而是利用了弱安全配置。攻击者使用了多个AI服务来生成攻击计划、自动化脚本和管理操作,这使得技术能力较低的攻击者也能进行大规模的攻击。 文章提到,商业AI降低了网络攻击的技术门槛,亚马逊没有透露具体使用的AI工具。攻击者似乎是出于财务动机,并没有迹象表明与国家支持的黑客组织有关。这次攻击是机会主义的,依靠自动化扫描寻找漏洞系统。 被入侵的设备分布在南亚、拉丁美洲、加勒比、西非、北欧和东南亚等地。亚马逊发现了大量俄语文档,显示AI生成的攻击计划和操作清单。攻击目标是FortiGate防火墙,这些设备帮助组织管理网络流量和远程访问。攻击者没有利用新发现的漏洞,而是寻找暴露的管理访问点和弱认证。 一旦进入设备,攻击者窃取了完整的配置信息,包括密码和网络架构细节,并进一步深入内部系统,在某些情况下甚至进入了Active Directory环境和备份系统,这可能为未来的勒索软件攻击做准备。 研究人员分析了从攻击者基础设施中恢复的自定义工具,包括用于凭证提取、VPN自动化和大规模扫描的脚本。代码显示出明显的AI辅助生成迹象:在标准条件下工作良好,但在意外情况下经常失败。 报告指出,当尝试超出简单的自动化攻击路径时,威胁行为者大多失败了,并且多次遇到修补过的系统或基本防御措施而被迫放弃操作。亚马逊表示其云基础设施并未参与此次攻击。 研究人员警告说此类活动的数量可能会增加,并建议组织应预期AI增强的威胁活动会继续增长。之前的研究已经警告过人工智能正在改变网络攻击的方式。 用户的需求是用中文总结文章内容,在100字以内,并且不需要特定开头。我需要确保信息准确且简洁。 </think> 一名俄罗斯语威胁行为者利用商业AI工具在1月至2月期间成功入侵全球55个国家的600多台Fortinet防火墙设备。此次网络攻击主要针对弱安全配置而非技术漏洞,并通过自动化手段实现大规模操作。研究人员指出商业AI降低了网络犯罪的技术门槛,并警告类似活动可能增加。 2026-2-23 17:30:48 Author: therecord.media(查看原文) 阅读量:3 收藏

A Russian-speaking threat actor used commercial generative artificial intelligence tools to help compromise more than 600 Fortinet FortiGate firewall devices across more than 55 countries earlier this year, researchers have found.

The campaign, which ran from mid-January to mid-February, exploited weak security configurations rather than advanced technical vulnerabilities, Amazon’s threat-intelligence team said in a report published on Friday.

The hackers relied heavily on multiple commercial AI services to generate attack plans, automate scripts, and manage operations, allowing what researchers described as a “low-to-medium-skilled actor” to operate at a scale previously associated with larger, more sophisticated groups.

“Commercial AI services can lower the technical barrier to entry for offensive cyber capabilities,” the report said. Amazon did not specify which AI tools were used in the campaign.

Researchers said the actor behind the attacks appeared to be financially motivated and was not known to be linked to any state-sponsored hacking group. The campaign appeared opportunistic rather than focused on specific industries, relying on automated mass scanning for vulnerable systems. Compromised devices were identified in a handful of regions, including South Asia, Latin America, the Caribbean, West Africa, Northern Europe, and Southeast Asia.

Amazon found extensive Russian-language documentation showing AI-generated attack plans, operational checklists, and custom code designed to automate nearly every stage of the campaign, from initial network scans to post-breach reporting.

The attacks targeted FortiGate firewalls — widely used security appliances that help organizations manage network traffic and remote access. According to Amazon, the breaches did not rely on newly discovered vulnerabilities. Instead, the attackers located devices with exposed administrative access points and weak authentication.

After gaining access, the attackers stole full device configurations that included passwords and details about network architecture. They used this information to move deeper into internal systems. In some cases, they gained access to organizations’ Active Directory environments and targeted backup systems — a step researchers say could indicate preparation for future ransomware attacks.

Researchers also analyzed custom tools recovered from the actor’s infrastructure, including scripts for credential extraction, VPN automation, and mass scanning. The code showed clear signs of AI-assisted generation: it worked under standard conditions but frequently failed in unexpected scenarios.

“The threat actor largely failed when attempting anything beyond straightforward automated attack paths,” the report found, noting repeated cases in which patched systems or basic defensive controls forced the group to abandon operations. In some instances, the attacker’s own documentation acknowledged that targets were too well protected to exploit.

Amazon said its own cloud infrastructure was not involved in the attacks. Researchers warned that the volume of such activity is likely to increase.

“Organizations should anticipate that AI-augmented threat activity will continue to grow in volume from both skilled and unskilled adversaries,” they added.

Researchers have previously warned that artificial intelligence is already reshaping how cyberattacks are carried out. 

Google said in November that state-backed hacking groups were experimenting with malware capable of using large language models during execution, allowing malicious code to adapt on the fly and potentially evade detection. More recently, researchers reported that sophisticated actors linked to China, North Korea and Iran were using Google’s Gemini AI system to enhance operations, refine malware development and gather intelligence on targets.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/gen-ai-fortigate-hackers-russia
如有侵权请联系:admin#unsafe.sh