February 21, 2026 Source: BleepingComputer 2 min read · 528 words

Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks

Amazon: хакер із підтримкою ШІ зламав 600 файрволів Fortinet за 5 тижнів

A Russian-speaking hacker just turned generative AI into a weapon against critical infrastructure worldwide. Amazon disclosed that this threat actor d AI services to compromise more than 600 FortiGate firewalls across 55 countries in a five-week sprint—and frankly, the speed and scale here should make security teams lose sleep.

This isn't some theoretical future threat. It's happening right now.

The Breach

According to BleepingComputer, Amazon's security team identified an active hacking campaign targeting FortiGate firewall devices—the kind of infrastructure that sits at the perimeter of enterprise networks, protecting everything behind them. Over 600 organizations in 55 countries fell victim. Five weeks. That's the entire operational window.

What makes this different from typical FortiGate exploits?

The attacker didn't just find vulnerabilities and hammer away manually. They weaponized generative AI to automate reconnaissance, craft exploits, and iterate through attack vectors at machine speed. The real question is: how many similar campaigns are out there right now using AI in ways we haven't even cataloged yet?

Under the Hood

The technical details here matter because they show a fundamental shift in how attacks are being orchestrated. The threat actor used AI-assisted tools to identify vulnerable FortiGate instances, generate custom payloads, and adapt techniques when initial approaches failed. This is different from previous amazon cyber attack news or documented amazon ddos attack today incidents—it's not brute force or simple credential stuffing.

Instead of one person writing one exploit, you've got a machine that can generate dozens of variations, test them, learn from failures, and move laterally across infrastructure.

The FortiGate devices targeted are critical chokepoints in network architecture. They're firewalls. They're the bouncers at the door. And if someone gets past them, they're basically inside the building.

The Fallout

Let's be direct: this represents a potential intelligence goldmine for the attacker. Network traffic logs. Configuration files. Credentials stored on firewall devices. Access to internal network topology. Any of this data flowing back to a Russian-speaking actor is a catastrophic outcome for affected organizations.

But there's a larger pattern emerging. The amazon cyber attack 2024 update and ongoing amazon cyber attack reddit discussions have highlighted how threat actors are evolving faster than defenders can respond. Now they're doing it with AI acceleration.

The compromised organizations span sectors and geographies. Financial services. Healthcare. Manufacturing. Telecom. Each breach creates cascading risks for downstream partners and customers who trusted that perimeter security.

Protecting Yourself

First: patch immediately if you're running FortiGate devices. Check your logs for suspicious activity spanning the five-week window BleepingComputer flagged. Look for unexpected administrative access, configuration changes, or traffic anomalies.

Second, assume your firewall was accessed and act accordingly.

Rotate credentials for any accounts that touch network infrastructure. Audit what traffic actually left your network during the compromise window. Work with threat intelligence teams to understand if your organization was targeted and what data may have been exfiltrated.

Third—and this is critical—don't treat this as a Fortinet problem alone. This is a signal that AI-assisted attacks are operationalized. Update your detection systems. Hunt for similar patterns across your environment. Brief your board. This affects your risk profile.

And if you're still treating security as a set-it-and-forget-it function, stop. The attacker just proved they can compromise 600 targets in 30 days using machine assistance. Your response needs to move at comparable speed.

Read original article →

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →