FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是网络安全研究人员发现一个新的攻击活动,威胁者利用FortiGate下一代防火墙作为入侵点。他们通过最近披露的漏洞或弱密码来获取配置文件,里面包含服务账户凭证和网络拓扑信息。目标行业包括医疗、政府和msp。 接下来,攻击者利用这些信息创建管理员账户,设置防火墙策略,甚至入侵到目录服务中,进一步在网络中横向移动。文章还提到这些设备因为集成防火墙和其他管理功能而成为高价值目标。 总结时要简洁明了,涵盖攻击手段、目标、影响以及设备的重要性。确保不超过100字,并且直接描述内容,不需要开头语。 </think> 研究人员发现威胁行为者利用FortiGate防火墙漏洞或弱密码入侵网络,窃取配置文件以获取服务账户凭证和网络结构信息。攻击主要针对医疗、政府和msp环境。成功入侵后,攻击者创建管理员账户并设置防火墙策略以扩大访问权限。此类设备因集成安全控制和管理功能而成为高价值目标。 2026-3-10 16:21:0 Author: thehackernews.com(查看原文) 阅读量:1 收藏

Network Security / Vulnerability

Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim networks. 

The activity involves the exploitation of recently disclosed security vulnerabilities or weak credentials to extract configuration files containing service account credentials and network topology information, SentinelOne said in a report published today. The security outfit said the campaign has singled out environments tied to healthcare, government, and managed service providers.

"FortiGate network appliances have considerable access to the environments they were installed to protect," security researchers Alex Delamotte, Stephen Bromfield, Mary Braden Murphy, and Amey Patne said. "In many configurations, this includes service accounts which are connected to the authentication infrastructure, such as Active Directory (AD) and Lightweight Directory Access Protocol (LDAP)."

"This setup can enable the appliance to map roles to specific users by fetching attributes about the connection that’s being analyzed and correlating with the Directory information, which is useful in cases where role-based policies are set or for increasing response speed for network security alerts detected by the device."

However, the cybersecurity company noted that such access could be exploited by attackers who break into FortiGate devices through known vulnerabilities (e.g., CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858) or misconfigurations.

In one incident, the attackers are said to have breached a FortiGate appliance in November 2025 to create a new local administrator account named "support" and used it to set up four new firewall policies that allowed the account to traverse all zones without any restrictions.

The threat actor then kept periodically checking to ensure the device was accessible, an action consistent with an initial access broker (IAB) establishing a foothold and selling it to other criminal actors for monetary gain. The next phase of the activity was detected in February 2026 when an attacker likely extracted the configuration file containing encrypted service account LDAP credentials.

"Evidence demonstrates the attacker authenticated to the AD using clear text credentials from the fortidcagent service account, suggesting the attacker decrypted the configuration file and extracted the service account credentials," SentinelOne said.

The attacker then leveraged the service account to authenticate to the victim's environment and enroll rogue workstations in the AD, allowing them deeper access. Following this step, network scanning was initiated, at which point the breach was detected, and further lateral movement was halted.

In another case investigated in late January 2026, attackers swiftly moved from firewall access to deploying remote access tools like Pulseway and MeshAgent. In addition, the threat actor downloaded malware from a cloud storage bucket via PowerShell from Amazon Web Services (AWS) infrastructure.

The Java malware, launched via DLL side-loading, was used to exfiltrate the contents of the NTDS.dit file and SYSTEM registry hive to an external server ("172.67.196[.]232") over port 443.

"While the actor may have attempted to crack passwords from the data, no such credential usage was identified between the time of credential harvesting and incident containment," SentinelOne added.

"NGFW appliances have become ubiquitous because they provide strong network monitoring capabilities for organizations by integrating security controls of a firewall with other management features, such as AD," it added. "However, these devices are high-value targets for actors with a variety of motivations and skill levels, from state-aligned actors conducting espionage to financially motivated attacks such as ransomware."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/fortigate-devices-exploited-to-breach.html
如有侵权请联系:admin#unsafe.sh