Wednesday , September 24 2025
Fortinet SSL VPN

Hackers To Attack Fortinet SSL VPN From 780 unique IPs

An unprecedented surge in brute-force attacks targeting Fortinet SSL VPN infrastructure, with over 780 unique IP addresses participating in coordinated assault campaigns.

Cisco Unveils New PlugX Backdoor Linked to Chinese APTs

Cisco Talos researchers have discovered an ongoing espionage campaign since 2022, targeting telecom and manufacturing sectors in Central and South...
Read More
Cisco Unveils New PlugX Backdoor Linked to Chinese APTs

Malaysia: Submarine Cable to Strengthen APAC Digital Backbone

A submarine cable project will enhance the digital infrastructure of the Asia-Pacific region. Covering around 8,000 kilometers underwater, it's set...
Read More
Malaysia: Submarine Cable to Strengthen APAC Digital Backbone

U.S. Secret Service Seizes 100K Cards and 300 SIM Servers network

The U.S. Secret Service dismantled a network of electronic devices located throughout the New York tristate area that were used...
Read More
U.S. Secret Service Seizes 100K Cards and 300 SIM Servers network

Massive 22.2 Tbps DDoS Attack Sets New World Record

Cloudflare announced today that it has successfully defended against the largest recorded DDoS attack, which peaked at 22.2 terabits per...
Read More
Massive 22.2 Tbps DDoS Attack Sets New World Record

Microsoft to Build the “World’s Most Powerful AI Data Center”

Microsoft has announced a new $4 billion investment in Wisconsin for a second hyperscale AI data center. This adds to...
Read More
Microsoft to Build the “World’s Most Powerful AI Data Center”

Fraudsters swipe Tk 27 lakh from SCB cardholders

An organised racket has reportedly siphoned off lakhs from Standard Chartered Bangladesh's (SCB) credit card holders, raising serious cybersecurity concerns....
Read More
Fraudsters swipe Tk 27 lakh from SCB cardholders

EDR-Freeze: A Tool That Puts EDRs And Antivirus Into A Coma State

A new proof-of-concept tool named EDR-Freeze has been developed, capable of placing Endpoint Detection and Response (EDR) and antivirus solutions...
Read More
EDR-Freeze: A Tool That Puts EDRs And Antivirus Into A Coma State

First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Code

AI-driven malware called 'MalTerminal' utilizes OpenAI's GPT-4 to create harmful code like ransomware and reverse shells, indicating a major change...
Read More
First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Code

Gmail Data exposes via ChatGPT Deep Research Agent dubbed “ShadowLeak Zero-Click” Flaw

Cybersecurity researchers revealed a zero-click vulnerability in OpenAI ChatGPT's Deep Research agent that lets attackers leak sensitive Gmail inbox data...
Read More
Gmail Data exposes via ChatGPT Deep Research Agent dubbed “ShadowLeak Zero-Click” Flaw

Cyber attack disrupts several European airports: check-in and boarding systems affected

Several European airports are experiencing flight delays and cancellations due to a cyber attack on a check-in and boarding systems...
Read More
Cyber attack disrupts several European airports: check-in and boarding systems affected

The August 3rd attack represents the highest single-day volume recorded on GreyNoise’s Fortinet SSL VPN Bruteforcer tag in recent months, raising concerns about potential zero-day vulnerabilities and sophisticated threat actor operations.

Fortinet Attack Waves Detected:

GreyNoise identified two distinct attack waves with markedly different characteristics and targeting methodologies.

The first wave consisted of sustained brute-force activity utilizing a consistent TCP signature that maintained steady traffic patterns over extended periods.

However, the second wave, beginning August 5th, demonstrated a completely different TCP signature profile and exhibited concentrated burst patterns that suggested coordinated infrastructure deployment.

The initial August 3rd traffic specifically targeted GreyNoise’s FortiOS profile, indicating precise reconnaissance and deliberate targeting of Fortinet’s SSL VPN implementations.

However, researchers observed a significant tactical shift when traffic fingerprinted with combined TCP and client signatures began consistently targeting FortiManager – FGFM profiles instead of FortiOS systems.

This behavioral pivot suggests either the same threat infrastructure adapting to new attack vectors or sophisticated toolset evolution targeting different Fortinet-facing services.

Key malicious IP addresses identified in the campaign include 31.206.51.194, 23.120.100.230, 96.67.212.83, 104.129.137.162, and 118.97.151.34, among others. Geographic analysis reveals Hong Kong and Brazil as the primary target countries over the past 90 days.

Investigation into historical data tied to post-August 5th TCP fingerprints revealed intriguing connections to residential network infrastructure.

GreyNoise discovered an earlier June spike featuring a unique client signature that resolved to IP address 104.129.137.162, identified as a FortiGate device operating within a residential ISP block managed by Pilot Fiber Inc.

This residential connection suggests either initial tooling development and testing from home networks or sophisticated use of residential proxy services to obfuscate attack origins.

The device showed recent detections by AbuseDB but remained undetected by residential proxy identification services like Spur.us, indicating potential evasion capabilities.

JA4+ signature analysis revealed clustering patterns connecting recent attack waves to prior traffic, establishing potential attribution links across multiple campaign phases.

GreyNoise research indicates that 80% of similar attack spikes precede CVE disclosure within six weeks, suggesting imminent vulnerability announcements affecting Fortinet infrastructure.

Organizations utilizing Fortinet SSL VPN solutions should immediately implement dynamic IP blocklists and monitor for traffic matching the identified attack signatures while preparing for potential emergency patching requirements.

Check Also

AI data center

Microsoft to Build the “World’s Most Powerful AI Data Center”

Microsoft has announced a new $4 billion investment in Wisconsin for a second hyperscale AI …