Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
    Cybersecurity

    FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

    adminBy adminMarch 10, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMar 10, 2026Network Security / Vulnerability

    Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim networks. 

    The activity involves the exploitation of recently disclosed security vulnerabilities or weak credentials to extract configuration files containing service account credentials and network topology information, SentinelOne said in a report published today. The security outfit said the campaign has singled out environments tied to healthcare, government, and managed service providers.

    “FortiGate network appliances have considerable access to the environments they were installed to protect,” security researchers Alex Delamotte, Stephen Bromfield, Mary Braden Murphy, and Amey Patne said. “In many configurations, this includes service accounts which are connected to the authentication infrastructure, such as Active Directory (AD) and Lightweight Directory Access Protocol (LDAP).”

    “This setup can enable the appliance to map roles to specific users by fetching attributes about the connection that’s being analyzed and correlating with the Directory information, which is useful in cases where role-based policies are set or for increasing response speed for network security alerts detected by the device.”

    However, the cybersecurity company noted that such access could be exploited by attackers who break into FortiGate devices through known vulnerabilities (e.g., CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858) or misconfigurations.

    In one incident, the attackers are said to have breached a FortiGate appliance in November 2025 to create a new local administrator account named “support” and used it to set up four new firewall policies that allowed the account to traverse all zones without any restrictions.

    The threat actor then kept periodically checking to ensure the device was accessible, an action consistent with an initial access broker (IAB) establishing a foothold and selling it to other criminal actors for monetary gain. The next phase of the activity was detected in February 2026 when an attacker likely extracted the configuration file containing encrypted service account LDAP credentials.

    “Evidence demonstrates the attacker authenticated to the AD using clear text credentials from the fortidcagent service account, suggesting the attacker decrypted the configuration file and extracted the service account credentials,” SentinelOne said.

    The attacker then leveraged the service account to authenticate to the victim’s environment and enroll rogue workstations in the AD, allowing them deeper access. Following this step, network scanning was initiated, at which point the breach was detected, and further lateral movement was halted.

    In another case investigated in late January 2026, attackers swiftly moved from firewall access to deploying remote access tools like Pulseway and MeshAgent. In addition, the threat actor downloaded malware from a cloud storage bucket via PowerShell from Amazon Web Services (AWS) infrastructure.

    The Java malware, launched via DLL side-loading, was used to exfiltrate the contents of the NTDS.dit file and SYSTEM registry hive to an external server (“172.67.196[.]232”) over port 443.

    “While the actor may have attempted to crack passwords from the data, no such credential usage was identified between the time of credential harvesting and incident containment,” SentinelOne added.

    “NGFW appliances have become ubiquitous because they provide strong network monitoring capabilities for organizations by integrating security controls of a firewall with other management features, such as AD,” it added. “However, these devices are high-value targets for actors with a variety of motivations and skill levels, from state-aligned actors conducting espionage to financially motivated attacks such as ransomware.”

    Account Breach Credentials Devices Exploited FortiGate networks service steal
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleMeta is passing Europe’s digital taxes directly to advertisers
    Next Article Stop speeding up podcasts and audiobooks
    admin
    • Website

    Related Posts

    Fortinet enhances SecOps with cloud SOC, AI automation, and managed services

    March 10, 2026

    US entities face heightened cyber risk related to Iran war

    March 10, 2026

    Microsoft brings phishing-resistant Windows sign-ins via Entra passkeys

    March 10, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Keywords Still Matter in Google Ads, But Intent Matters More (Here’s Why)

    March 10, 2026

    Stop speeding up podcasts and audiobooks

    March 10, 2026

    FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

    March 10, 2026

    Meta is passing Europe’s digital taxes directly to advertisers

    March 10, 2026
    Categories
    • Blogging (36)
    • Cybersecurity (701)
    • Privacy & Online Earning (98)
    • SEO & Digital Marketing (438)
    • Tech Tools & Mobile / Apps (867)
    • WiFi / Internet & Networking (116)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Keywords Still Matter in Google Ads, But Intent Matters More (Here’s Why)

    March 10, 2026

    Stop speeding up podcasts and audiobooks

    March 10, 2026

    FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

    March 10, 2026
    Most Popular
    • Keywords Still Matter in Google Ads, But Intent Matters More (Here’s Why)
    • Stop speeding up podcasts and audiobooks
    • FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
    • Meta is passing Europe’s digital taxes directly to advertisers
    • I stopped fighting Windows over microphone switching once I found this app
    • Fortinet enhances SecOps with cloud SOC, AI automation, and managed services
    • 10 best UK VPN services for 2026
    • We Analyzed 89K LinkedIn URLs Cited in AI Search: Here‘s What Drives Visibility
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.