A Russian-speaking threat actor has leveraged artificial intelligence to orchestrate cyberattacks on organizations with misconfigured firewalls across 55 countries, according to recent research from Amazon Web Services (AWS). The attacks, which took place between January 11 and February 18, resulted in the compromise of over 600 Fortinet FortiGate devices without exploiting any technical vulnerabilities, as detailed in a blog post by AWS’s threat intelligence team.
CJ Moses, Chief Information Security Officer at Amazon Integrated Security, noted that the campaign successfully targeted organizations by exploiting exposed management ports and weak credentials protected only by single-factor authentication. These fundamental security gaps allowed the attackers, described as a financially motivated individual or small group, to scale their operations with the assistance of AI tools.
The threat actor utilized various generative AI tools to implement widely known attack techniques, demonstrating a surprising level of operational capability despite their limited technical skills. Amazon does not believe that this group is linked to the Russian government, emphasizing their opportunistic nature. The report underscores the potential for unsophisticated hackers to pose significant threats to organizations running vulnerable or misconfigured devices, amplified by AI’s capabilities.
The threat actor’s tactics included breaching victims’ Active Directory environments, stealing password databases, and attempting to infect backup systems—actions that hint at a potential ransomware attack. Moses remarked that when faced with more sophisticated defenses, the attackers would move on to softer targets, highlighting their reliance on AI-augmented efficiency rather than advanced skills.
This opportunistic campaign exhibited a broad focus, with no specific interest in particular countries or industries. The common link among the targeted organizations was their use of internet-accessible FortiGate firewalls, which have become increasingly favored by hackers in recent months. The configuration files of these devices are particularly valuable, as they contain sensitive information such as administrator account credentials and network design details.
The threat actor reportedly created AI-assisted Python scripts to parse, decrypt, and organize the stolen configurations, revealing a systematic approach to their attacks. These scripts were designed to identify target networks, categorize them by size, scan ports to determine active services, and employ open-source vulnerability scanners to prioritize potential targets.
Amazon identified that the use of AI in this scenario resulted in code that bore the hallmarks of automated development. This included repetitive comments and simplistic architecture, indicating that the scripts were likely created without significant refinement. While the coding was functional, it lacked robustness and struggled under edge cases, which are common characteristics of AI-generated code.
The threat actor employed two distinct AI tools for different phases of their operation. One served as a general planner, developing code, while the other facilitated navigation within compromised networks. When the attackers encountered resistance, they struggled to adapt their plans, indicating their novice status in cybersecurity.
In light of these developments, AWS highlighted several strategies for organizations using FortiGate devices to fortify their security. Key recommendations include disabling internet access unless absolutely necessary, changing default passwords, implementing multifactor authentication, and conducting regular scans for unauthorized configuration changes. Additionally, reviewing VPN connection logs for unusual activity can help identify potential breaches.
Organizations are also advised to look for indicators of exploitation, such as unauthorized access to backup systems and the creation of new user accounts or scheduled tasks that appear legitimate. AWS stressed the importance of isolating backup infrastructure from main networks to maintain a fallback plan insulated from potential cyberattack disruptions.
The findings from Amazon’s research highlight a critical shift in the cybersecurity landscape, suggesting that even less technically skilled actors can leverage AI to carry out sophisticated attacks. As threats continue to evolve, organizations must remain vigilant and proactive in their security measures to protect against increasing cyber risks.
See also
Anthropic’s Claims of AI-Driven Cyberattacks Raise Industry Skepticism
Anthropic Reports AI-Driven Cyberattack Linked to Chinese Espionage
Quantum Computing Threatens Current Cryptography, Experts Seek Solutions
Anthropic’s Claude AI exploited in significant cyber-espionage operation
AI Poisoning Attacks Surge 40%: Businesses Face Growing Cybersecurity Risks
















































