Connect with us

Hi, what are you looking for?

AI Cybersecurity

AI-Driven Attacks Compromise 600+ FortiGate Devices Across 55 Countries

A Russian-speaking threat actor compromised over 600 Fortinet devices across 55 countries by exploiting AI tools and misconfigured firewalls, raising urgent cybersecurity concerns.

A Russian-speaking threat actor has leveraged artificial intelligence to orchestrate cyberattacks on organizations with misconfigured firewalls across 55 countries, according to recent research from Amazon Web Services (AWS). The attacks, which took place between January 11 and February 18, resulted in the compromise of over 600 Fortinet FortiGate devices without exploiting any technical vulnerabilities, as detailed in a blog post by AWS’s threat intelligence team.

CJ Moses, Chief Information Security Officer at Amazon Integrated Security, noted that the campaign successfully targeted organizations by exploiting exposed management ports and weak credentials protected only by single-factor authentication. These fundamental security gaps allowed the attackers, described as a financially motivated individual or small group, to scale their operations with the assistance of AI tools.

The threat actor utilized various generative AI tools to implement widely known attack techniques, demonstrating a surprising level of operational capability despite their limited technical skills. Amazon does not believe that this group is linked to the Russian government, emphasizing their opportunistic nature. The report underscores the potential for unsophisticated hackers to pose significant threats to organizations running vulnerable or misconfigured devices, amplified by AI’s capabilities.

The threat actor’s tactics included breaching victims’ Active Directory environments, stealing password databases, and attempting to infect backup systems—actions that hint at a potential ransomware attack. Moses remarked that when faced with more sophisticated defenses, the attackers would move on to softer targets, highlighting their reliance on AI-augmented efficiency rather than advanced skills.

This opportunistic campaign exhibited a broad focus, with no specific interest in particular countries or industries. The common link among the targeted organizations was their use of internet-accessible FortiGate firewalls, which have become increasingly favored by hackers in recent months. The configuration files of these devices are particularly valuable, as they contain sensitive information such as administrator account credentials and network design details.

The threat actor reportedly created AI-assisted Python scripts to parse, decrypt, and organize the stolen configurations, revealing a systematic approach to their attacks. These scripts were designed to identify target networks, categorize them by size, scan ports to determine active services, and employ open-source vulnerability scanners to prioritize potential targets.

Amazon identified that the use of AI in this scenario resulted in code that bore the hallmarks of automated development. This included repetitive comments and simplistic architecture, indicating that the scripts were likely created without significant refinement. While the coding was functional, it lacked robustness and struggled under edge cases, which are common characteristics of AI-generated code.

The threat actor employed two distinct AI tools for different phases of their operation. One served as a general planner, developing code, while the other facilitated navigation within compromised networks. When the attackers encountered resistance, they struggled to adapt their plans, indicating their novice status in cybersecurity.

In light of these developments, AWS highlighted several strategies for organizations using FortiGate devices to fortify their security. Key recommendations include disabling internet access unless absolutely necessary, changing default passwords, implementing multifactor authentication, and conducting regular scans for unauthorized configuration changes. Additionally, reviewing VPN connection logs for unusual activity can help identify potential breaches.

Organizations are also advised to look for indicators of exploitation, such as unauthorized access to backup systems and the creation of new user accounts or scheduled tasks that appear legitimate. AWS stressed the importance of isolating backup infrastructure from main networks to maintain a fallback plan insulated from potential cyberattack disruptions.

The findings from Amazon’s research highlight a critical shift in the cybersecurity landscape, suggesting that even less technically skilled actors can leverage AI to carry out sophisticated attacks. As threats continue to evolve, organizations must remain vigilant and proactive in their security measures to protect against increasing cyber risks.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

AI Cybersecurity

AWS reveals over 600 Fortinet FortiGate firewalls were compromised in a generative AI-enhanced cyberattack affecting 55+ countries from January to February 2026.

AI Research

AWS experienced significant disruptions on October 7, 2023, as users faced access issues due to Amazon CloudFront errors, impacting business operations nationwide.

AI Cybersecurity

Anthropic's launch of Claude Code Security triggers an 8% drop in cybersecurity stocks, wiping billions from market valuations as AI disrupts the sector.

AI Tools

Amazon Web Services experienced a 13-hour disruption in December 2025 due to misconfigurations linked to its Kiro AI, prompting concerns over AI integration risks.

AI Technology

Amazon Web Services faces reliability concerns after two AI-related outages, including a 13-hour disruption, amid scrutiny over its growing role in critical infrastructure.

AI Cybersecurity

CloudFront outages disrupt access to major AI applications, highlighting vulnerabilities as traffic surges and operational challenges escalate for businesses.

Top Stories

Microsoft introduces the Maia 200 AI chip to boost inference efficiency, intensifying competition in custom processors while NVIDIA retains its lead in versatile GPU...

Top Stories

Amazon Web Services' CloudFront outage disrupts connectivity for thousands globally, raising concerns over cloud infrastructure reliability and prompting businesses to reconsider their strategies.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.