AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks
Summary
Hide ▲
Show ▼
A Russian-speaking, financially motivated hacker used generative AI services to breach over 600 FortiGate firewalls across 55 countries in five weeks. The campaign, which occurred between January 11 and February 18, 2026, targeted exposed management interfaces and weak credentials lacking MFA protection. The attacker used AI to automate access to other devices on breached networks, extracting sensitive configuration data and conducting reconnaissance. The attacker successfully compromised multiple organizations' Active Directory environments, extracted complete credential databases, and targeted backup infrastructure, likely in a lead-up to ransomware deployment. The threat actor used the CyberStrikeAI AI-powered security testing platform, which integrates over 100 security tools and allows for end-to-end automation of attacks. The developer of CyberStrikeAI, known as "Ed1s0nZ," has links to Chinese government-affiliated cyber operations and has worked on additional AI-assisted security tools. Team Cymru detected 21 unique IP addresses running CyberStrikeAI between January 20 and February 26, 2026, primarily hosted in China, Singapore, and Hong Kong. Additional servers related to CyberStrikeAI have been detected in the U.S., Japan, and Switzerland. The developer has interacted with organizations supporting potentially Chinese government state-sponsored cyber operations, including Knownsec 404, a Chinese security vendor with ties to the Chinese Ministry of State Security (MSS). Ed1s0nZ has removed references to a CNNVD Level 2 Contribution Award from their GitHub profile. The campaign targeted healthcare, government, and managed service providers. The attackers exploited vulnerabilities CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858. The attackers created a new local administrator account named "support" and set up four new firewall policies allowing unrestricted access. The attackers periodically checked device accessibility, consistent with initial access broker (IAB) behavior. The attackers extracted configuration files containing encrypted service account LDAP credentials. The attackers authenticated to the AD using clear text credentials from the fortidcagent service account. The attackers enrolled rogue workstations in the AD, allowing deeper access. The attackers deployed remote access tools like Pulseway and MeshAgent. The attackers downloaded malware from a cloud storage bucket via PowerShell from AWS infrastructure. The Java malware was used to exfiltrate the contents of the NTDS.dit file and SYSTEM registry hive to an external server (172.67.196[.]232) over port 443.
Timeline
-
03.03.2026 16:29 1 articles · 8d ago
Developer Ed1s0nZ Linked to Chinese Government Operations
The developer of CyberStrikeAI, known as "Ed1s0nZ," has interacted with organizations supporting potentially Chinese government state-sponsored cyber operations, including Knownsec 404, a Chinese security vendor with ties to the Chinese Ministry of State Security (MSS). Ed1s0nZ has removed references to a CNNVD Level 2 Contribution Award from their GitHub profile.
Show sources
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
-
03.03.2026 02:06 2 articles · 8d ago
CyberStrikeAI Platform Used in FortiGate Firewall Breaches
The threat actor used the CyberStrikeAI AI-powered security testing platform, which integrates over 100 security tools and allows for end-to-end automation of attacks. The platform was observed running on port 8080 on the IP address 212.11.64[.]250 and was last seen on January 30, 2026. Team Cymru detected 21 unique IP addresses running CyberStrikeAI between January 20 and February 26, 2026, primarily hosted in China, Singapore, and Hong Kong. Additional servers related to CyberStrikeAI have been detected in the U.S., Japan, and Switzerland. The developer of CyberStrikeAI, known as "Ed1s0nZ," has links to Chinese government-affiliated cyber operations and has worked on additional AI-assisted security tools. The developer's GitHub activity shows interactions with organizations linked to Chinese government-affiliated cyber operations, and the developer received a "CNNVD 2024 Vulnerability Reward Program – Level 2 Contribution Award." Ed1s0nZ has removed references to the CNNVD award from their GitHub profile.
Show sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
-
21.02.2026 15:50 5 articles · 18d ago
AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks
The campaign targeted healthcare, government, and managed service providers. The attackers exploited vulnerabilities CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858. The attackers created a new local administrator account named "support" and set up four new firewall policies allowing unrestricted access. The attackers periodically checked device accessibility, consistent with initial access broker (IAB) behavior. The attackers extracted configuration files containing encrypted service account LDAP credentials. The attackers authenticated to the AD using clear text credentials from the fortidcagent service account. The attackers enrolled rogue workstations in the AD, allowing deeper access. The attackers deployed remote access tools like Pulseway and MeshAgent. The attackers downloaded malware from a cloud storage bucket via PowerShell from AWS infrastructure. The Java malware was used to exfiltrate the contents of the NTDS.dit file and SYSTEM registry hive to an external server (172.67.196[.]232) over port 443.
Show sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
Information Snippets
-
The campaign occurred between January 11 and February 18, 2026.
First reported: 21.02.2026 15:503 sources, 5 articlesShow sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The hacker targeted exposed management interfaces and weak credentials lacking MFA protection.
First reported: 21.02.2026 15:503 sources, 5 articlesShow sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attacker used AI to automate access to other devices on breached networks.
First reported: 21.02.2026 15:503 sources, 5 articlesShow sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The compromised firewalls were observed across South Asia, Latin America, the Caribbean, West Africa, Northern Europe, and Southeast Asia.
First reported: 21.02.2026 15:503 sources, 4 articlesShow sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attacker used brute-force attacks with common passwords to gain access to devices.
First reported: 21.02.2026 15:503 sources, 3 articlesShow sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
-
The attacker extracted SSL-VPN user credentials, administrative credentials, firewall policies, IPsec VPN configurations, network topology, and routing information.
First reported: 21.02.2026 15:503 sources, 4 articlesShow sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attacker used AI-assisted Python and Go tools to parse and decrypt configuration files.
First reported: 21.02.2026 15:503 sources, 4 articlesShow sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attacker deployed custom reconnaissance tools written in Go and Python.
First reported: 21.02.2026 15:503 sources, 4 articlesShow sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attacker targeted Veeam Backup & Replication servers using custom PowerShell scripts and compiled credential-extraction tools.
First reported: 21.02.2026 15:503 sources, 4 articlesShow sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attacker attempted to exploit vulnerabilities such as CVE-2019-7192, CVE-2023-27532, and CVE-2024-40711.
First reported: 21.02.2026 15:503 sources, 4 articlesShow sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attacker used at least two large language model providers to generate attack methodologies, develop custom scripts, create reconnaissance frameworks, plan lateral movement strategies, and draft operational documentation.
First reported: 21.02.2026 15:503 sources, 3 articlesShow sources
- Amazon: AI-assisted hacker breached 600 FortiGate firewalls in 5 weeks — www.bleepingcomputer.com — 21.02.2026 15:50
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
-
The threat actor is assessed to be driven by financial gain and not associated with any advanced persistent threat (APT) with state-sponsored resources.
First reported: 21.02.2026 16:492 sources, 2 articlesShow sources
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
-
The threat actor used at least two large language model providers to generate attack methodologies, develop custom scripts, create reconnaissance frameworks, plan lateral movement strategies, and draft operational documentation.
First reported: 21.02.2026 16:492 sources, 2 articlesShow sources
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
-
The threat actor successfully compromised multiple organizations' Active Directory environments, extracted complete credential databases, and targeted backup infrastructure, likely in a lead-up to ransomware deployment.
First reported: 21.02.2026 16:492 sources, 3 articlesShow sources
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The threat actor used systematic scanning of FortiGate management interfaces exposed to the internet across ports 443, 8443, 10443, and 4443, followed by attempts to authenticate using commonly reused credentials.
First reported: 21.02.2026 16:492 sources, 3 articlesShow sources
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The scanning activity originated from the IP address 212.11.64[.]250.
First reported: 21.02.2026 16:493 sources, 5 articlesShow sources
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The threat actor deployed a custom reconnaissance tool, with different versions written in both Go and Python, showing clear indicators of AI-assisted development.
First reported: 21.02.2026 16:492 sources, 3 articlesShow sources
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries — thehackernews.com — 21.02.2026 16:49
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The threat actor used multiple commercial GenAI services to implement and scale well-known attack techniques throughout every phase of their operation.
First reported: 23.02.2026 14:303 sources, 3 articlesShow sources
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The threat actor's tools lacked robustness and failed under edge cases, characteristics typical of AI-generated code used without significant refinement.
First reported: 23.02.2026 14:303 sources, 3 articlesShow sources
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The threat actor used AI for attack planning, multi-model operational workflow, compromise planning, and infrastructure building.
First reported: 23.02.2026 14:303 sources, 3 articlesShow sources
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The threat actor used AI to generate comprehensive attack methodologies complete with step-by-step exploitation instructions, expected success rates, time estimates, and prioritized task trees.
First reported: 23.02.2026 14:303 sources, 3 articlesShow sources
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The threat actor used AI to build infrastructure, including configuration parsers, credential extraction tools, VPN connection automation, mass scanning orchestration, and result aggregation dashboards.
First reported: 23.02.2026 14:302 sources, 2 articlesShow sources
- Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls — www.infosecurity-magazine.com — 23.02.2026 14:30
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The threat actor used the CyberStrikeAI AI-powered security testing platform.
First reported: 03.03.2026 02:062 sources, 3 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The CyberStrikeAI platform integrates over 100 security tools, an intelligent orchestration engine, predefined security roles, and a skills system.
First reported: 03.03.2026 02:062 sources, 3 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The CyberStrikeAI platform includes an AI decision engine compatible with models such as GPT, Claude, and DeepSeek.
First reported: 03.03.2026 02:062 sources, 3 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The CyberStrikeAI platform allows for end-to-end automation from conversational commands to vulnerability discovery, attack-chain analysis, knowledge retrieval, and result visualization.
First reported: 03.03.2026 02:062 sources, 2 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The CyberStrikeAI platform includes tools for network scanning, web and application testing, exploitation frameworks, password cracking, and post-exploitation frameworks.
First reported: 03.03.2026 02:062 sources, 3 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The CyberStrikeAI platform was observed running on port 8080 on the IP address 212.11.64[.]250.
First reported: 03.03.2026 02:062 sources, 3 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The CyberStrikeAI platform was last seen running on January 30, 2026.
First reported: 03.03.2026 02:062 sources, 2 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The developer of CyberStrikeAI goes by the alias "Ed1s0nZ."
First reported: 03.03.2026 02:062 sources, 3 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The developer has worked on additional AI-assisted security tools, including PrivHunterAI and InfiltrateX.
First reported: 03.03.2026 02:062 sources, 3 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The developer's GitHub activity shows interactions with organizations previously linked to Chinese government-affiliated cyber operations.
First reported: 03.03.2026 02:062 sources, 3 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The developer received a "CNNVD 2024 Vulnerability Reward Program – Level 2 Contribution Award" on their GitHub profile.
First reported: 03.03.2026 02:062 sources, 3 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The developer's GitHub repositories are primarily written in Chinese, suggesting they are a Chinese-speaking developer.
First reported: 03.03.2026 02:062 sources, 3 articlesShow sources
- CyberStrikeAI tool adopted by hackers for AI-powered attacks — www.bleepingcomputer.com — 03.03.2026 02:06
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
CyberStrikeAI is an open-source AI-native security testing platform developed by a China-based developer with ties to the Chinese government.
First reported: 03.03.2026 16:291 source, 2 articlesShow sources
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
Team Cymru detected 21 unique IP addresses running CyberStrikeAI between January 20 and February 26, 2026, primarily hosted in China, Singapore, and Hong Kong.
First reported: 03.03.2026 16:291 source, 2 articlesShow sources
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
Additional servers related to CyberStrikeAI have been detected in the U.S., Japan, and Switzerland.
First reported: 03.03.2026 16:291 source, 2 articlesShow sources
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The developer, known as Ed1s0nZ, has published several other tools demonstrating interest in exploitation and jailbreaking AI models.
First reported: 03.03.2026 16:291 source, 2 articlesShow sources
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
Ed1s0nZ has interacted with organizations supporting potentially Chinese government state-sponsored cyber operations, including Knownsec 404.
First reported: 03.03.2026 16:291 source, 2 articlesShow sources
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
Knownsec 404 is a Chinese security vendor with ties to the Chinese Ministry of State Security (MSS).
First reported: 03.03.2026 16:291 source, 2 articlesShow sources
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
Ed1s0nZ has removed references to a CNNVD Level 2 Contribution Award from their GitHub profile.
First reported: 03.03.2026 16:291 source, 2 articlesShow sources
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries — thehackernews.com — 03.03.2026 16:29
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The campaign targeted healthcare, government, and managed service providers.
First reported: 10.03.2026 18:211 source, 1 articleShow sources
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attackers exploited vulnerabilities CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858.
First reported: 10.03.2026 18:211 source, 1 articleShow sources
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attackers created a new local administrator account named "support" and set up four new firewall policies allowing unrestricted access.
First reported: 10.03.2026 18:211 source, 1 articleShow sources
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attackers periodically checked device accessibility, consistent with initial access broker (IAB) behavior.
First reported: 10.03.2026 18:211 source, 1 articleShow sources
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attackers extracted configuration files containing encrypted service account LDAP credentials.
First reported: 10.03.2026 18:211 source, 1 articleShow sources
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attackers authenticated to the AD using clear text credentials from the fortidcagent service account.
First reported: 10.03.2026 18:211 source, 1 articleShow sources
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attackers enrolled rogue workstations in the AD, allowing deeper access.
First reported: 10.03.2026 18:211 source, 1 articleShow sources
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attackers deployed remote access tools like Pulseway and MeshAgent.
First reported: 10.03.2026 18:211 source, 1 articleShow sources
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The attackers downloaded malware from a cloud storage bucket via PowerShell from AWS infrastructure.
First reported: 10.03.2026 18:211 source, 1 articleShow sources
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
-
The Java malware was used to exfiltrate the contents of the NTDS.dit file and SYSTEM registry hive to an external server (172.67.196[.]232) over port 443.
First reported: 10.03.2026 18:211 source, 1 articleShow sources
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials — thehackernews.com — 10.03.2026 18:21
Similar Happenings
AI-Driven Attack Acceleration and New Attack Surfaces
AI-powered adversarial systems are significantly reducing the time between exposure and exploitation, leveraging machine speed and scale to identify and exploit vulnerabilities faster than traditional security teams can respond. This acceleration is driven by AI's ability to automate reconnaissance, simulate attack sequences, and prioritize exploitable vulnerabilities. Additionally, AI adoption introduces new attack surfaces, including model context protocol vulnerabilities and supply chain hallucinations.
Low-Skilled Cybercriminals Use AI for Vibe Extortion Attacks
Low-skilled cybercriminals are leveraging AI to enhance their extortion campaigns, a technique dubbed 'vibe extortion' by researchers. This involves using large language models (LLMs) to script professional extortion strategies, including deadlines and pressure tactics. While the attackers themselves lack technical depth, AI provides coherence and professionalism to their threats. The use of AI in cybercrime has evolved beyond simple grammar improvements to include rapid vulnerability scanning, parallelized targeting, and automated ransomware tasks. Unit 42 researchers highlight that AI acts as a 'force multiplier' for attackers, significantly reducing operational friction and lowering the barrier to entry for cybercriminals.
FBI Seizes RAMP Cybercrime Forum
The FBI has seized the RAMP cybercrime forum, a platform known for facilitating ransomware operations and other cybercriminal activities. The seizure includes both the forum's Tor site and its clearnet domain, ramp4u[.]io, which now display a seizure notice. The forum was a hub for ransomware gangs to advertise their operations and recruit affiliates. The seizure provides law enforcement with access to a significant amount of data tied to the forum's users, including email addresses, IP addresses, and private messages. This could lead to the identification and potential arrest of threat actors who failed to follow proper operational security (opsec). RAMP was created in 2021 by individuals linked to the now-defunct Babuk ransomware group and was administered by key operators such as Mikhail Matveev (also known as Orange, Wazawaka, and BorisElcin) and Stallman. The forum was a prime hub for various ransomware groups, including LockBit, ALPHV/BlackCat, Conti, DragonForce, Qilin, Nova, Radiant, and RansomHub. Following the seizure, Stallman confirmed there were no plans to rebuild the forum, indicating a significant disruption to the cybercriminal ecosystem. Additionally, the FBI has seized the LeakBase cybercrime forum, a major online forum used by cybercriminals to buy and sell hacking tools and stolen data. The forum had over 142,000 members and more than 215,000 messages between members as of December 2025. The seizure is part of an international joint operation coordinated by Europol, known as 'Operation Leak,' involving law enforcement agencies in 14 countries. The operation included the shutdown of LeakBase's domains, posting seizure banners, and warning members of the seizure. Law enforcement executed search warrants, made arrests, and conducted interviews in multiple countries. The seizure banner notes that the forum's database and all its contents, including IP logs and private messages, will be used for evidentiary purposes in future investigations. The domain nameservers have been switched to ns1.fbi.seized.gov and ns2.fbi.seized.gov. The operation involved around 100 enforcement actions worldwide, including measures against 37 of the most active users of the platforms. LeakBase was active since 2021 and had over 142,000 members, offering access to databases, a market for selling leaks, exploits, and other cybercrime services, and an escrow payment system.
AI-Specific Attack Vectors Exploit Gaps in Traditional Security Frameworks
In 2024 and 2025, several high-profile incidents demonstrated that traditional security frameworks fail to address AI-specific threats. The Ultralytics AI library was compromised in December 2024, malicious Nx packages leaked credentials in August 2025, and ChatGPT vulnerabilities allowed unauthorized data extraction. These incidents highlight that existing frameworks like NIST CSF, ISO 27001, and CIS Controls do not cover AI-specific attack vectors such as prompt injection, model poisoning, and AI supply chain attacks. The lack of AI-specific guidance in these frameworks leaves organizations vulnerable despite meeting compliance requirements. Security teams need to implement new technical capabilities and build specialized knowledge to defend against these evolving threats.
AI-Driven Cyberattacks Exploit Network Vulnerabilities
Adversarial AI-based attacks, such as those by Scattered Spider, are accelerating and leveraging living-off-the-land methods to spread and evade detection. These attacks use AI orchestration to perform network reconnaissance, discover vulnerabilities, move laterally, and harvest data at speeds that overwhelm manual detection methods. The Cloud Security Alliance report highlights over 70 ways autonomous AI-based agents can attack enterprise systems, expanding the attack surface beyond traditional security practices. Network Detection and Response (NDR) systems are increasingly being adopted to counter these AI-driven threats by providing real-time monitoring, analyzing network data, and identifying abnormal traffic patterns. NDR solutions can detect fast-moving, polymorphic attacks, summarize network activities, and render verdicts on potential threats, reducing the pressure on SOC analysts. Recent reports from Google's Threat Intelligence Group and Anthropic have revealed new AI-fueled attack methods, including the use of LLMs to generate malicious scripts and AI-orchestrated cyber espionage campaigns. Adversaries are also exploiting AV exclusion rules and using steganography techniques to evade detection. The combined use of NDR and EDR is essential for detecting and mitigating these sophisticated attacks.