February 23, 2026 Source: SecurityWeek 2 min read · 518 words

Hundreds of FortiGate Firewalls Hacked in AI-Powered Attacks: AWS

Сотні міжмережевих екранів FortiGate зламано в атаках з використанням ШІ: AWS

When Did This Start?

According to SecurityWeek, the attack campaign is happening right now. Not last month. Not some historical breach we're learning about months later. This is an active, ongoing cybersecurity incident with real victims experiencing compromise as you read this.

The threat actors are using AI-powered techniques to systematically identify and exploit hundreds of FortiGate firewalls. That's the kind of scale that should alarm any organization relying on these devices as their primary network perimeter defense.

The Discovery

AWS is the one who surfaced this threat, according to SecurityWeek's reporting. The discovery likely came through their threat intelligence operations or security monitoring infrastructure—AWS sees a lot of malicious traffic crossing their networks, and their security teams have the tools to spot coordinated campaigns.

But here's the question that matters: how many compromises happened before anyone noticed?

The fact that hundreds of devices were targeted suggests this campaign ran long enough to hit a substantial number of targets. That's not a quick, opportunistic attack. This is methodical work.

Technical Analysis

What's actually happening here is depressingly straightforward. Threat actors are using AI to automate reconnaissance and exploitation against exposed FortiGate firewalls. They're looking for two things: exposed management ports and weak credentials.

Exposed ports.

And weak passwords.

This isn't sophisticated zero-day exploitation requiring reverse engineering. This is basic network hygiene failure at scale. The devices are sitting on the internet with their management interfaces visible. The credentials protecting them aren't strong enough to resist automated attack.

The AI component accelerates the process. Instead of manually testing credentials or scanning networks, the threat actors deployed machine learning to identify patterns, prioritize targets, and optimize their exploitation workflow. It's automation on top of a fundamental security gap.

Damage Assessment

Here's what we know so far: hundreds of FortiGate firewalls are compromised. Real organizations have been hit. Victims are dealing with the fallout.

Frankly, that's catastrophic for any organization affected.

FortiGate firewalls sit at the network perimeter. They're supposed to be the barrier between your internal network and the hostile internet. When they're compromised, the attacker owns your front door. They can see your traffic. They can pivot deeper into your infrastructure. They can establish persistent access.

The scope of what an attacker can do with a compromised firewall—lateral movement, data exfiltration, malware deployment—is nearly unlimited.

Mitigation

If you're running FortiGate firewalls, the immediate action items are clear:

First, change your admin credentials. Now. Use strong, unique passwords. Better yet, implement multi-factor authentication if you haven't already.

Second, verify your management interface isn't exposed to the public internet. Lock it down to specific IP ranges. Restrict access ruthlessly.

Third, check your logs. Look for suspicious login attempts or administrative activity you didn't authorize. If you find evidence of compromise, assume the worst and investigate thoroughly.

Fourth, review Fortinet's security advisories. They've likely published patches or mitigation guidance specific to these attacks.

And then monitor. Continuously. This campaign is active, which means new targets are being hit today. You need to know immediately if your devices are compromised.

The real question is why these devices were exposed in the first place. Every organization running internet-facing firewalls should have locked-down management access and strong authentication as baseline security. This attack campaign exists because that baseline wasn't met.

Read original article →

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →