Malicious login events ranging from several hundred to several thousand have been deployed against Fortinet FortiGate firewalls with online management interfaces as part of a widespread exploitation campaign that potentially involved a zero-day vulnerability between mid-November and late December, The Register reports. After commencing suspicious jsconsole logins on targeted FortiGate firewalls' web-based command-line interface on Nov. 16, threat actors waited until early December to conduct extensive firewall configuration modifications aimed at facilitating SSL VPN access, according to an analysis from Arctic Wolf Labs. Aside from establishing new super admin accounts, attackers also took over existing accounts to enable the creation of SSL VPN tunnels, which was followed by credential harvesting for lateral movement. "While the initial access vector used in this campaign is not yet confirmed, Arctic Wolf Labs assesses with high confidence that mass exploitation of a zero-day vulnerability is likely given the compressed timeline across affected organizations as well as firmware versions affected," said researchers.
Network Security, Vulnerability Management, Threat Intelligence
Widespread Fortinet firewall exploitation likely due to zero-day

Data exposed of more than 15K Fortinet FortiGate firewalls. (Adobe Stock)
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds