AI-augmented attacks on FortiGate devices at scale: what it means and what to do now

Simon Poole • February 24, 2026

AI-augmented attacks on FortiGate devices at scale: what it means and what to do now

Amazon Threat Intelligence has published a timely investigation into a campaign where a Russian-speaking, financially motivated threat actor used multiple commercial generative AI services to compromise 600+ FortiGate devices across 55+ countries between 11 January and 18 February 2026.


The most important detail is also the most sobering: this wasn’t a “zero-day” story. Amazon reports they did not observe exploitation of FortiGate vulnerabilities. Instead, the campaign succeeded by targeting internet-exposed management interfaces and weak, single-factor credentials—basic gaps that AI helped an unsophisticated operator exploit at speed and at scale.


Amazon also notes that AWS infrastructure was not involved in the campaign; the findings are being shared to help the wider community defend against similar activity.


Why this matters in 2026


This is a clean example of what many security teams are now seeing: commercial AI services can reduce the effort needed to plan, script, and operationalise common attack techniques. In Amazon’s assessment, the actor’s baseline skill level was low-to-medium, but their operational throughput and breadth were significantly increased by AI augmentation.


The defensive lesson is not “buy an AI product.” It’s simpler:


  • If your fundamentals are weak (exposed management, password reuse, no MFA), attackers can now test and exploit those weaknesses faster.
  • If your fundamentals are strong (restricted admin access, credential hygiene, segmentation, recovery posture), even “AI-augmented” operators often move on rather than persist.


The attack chain, in plain English


Based on Amazon’s write-up, the flow looks like this:


1) Initial access: mass credential abuse against exposed management ports


The actor systematically scanned for FortiGate management interfaces across ports 443, 8443, 10443 and 4443, then attempted logins using commonly reused credentials.


2) Configuration theft: why FortiGate configs are such valuable targets


Once a device is accessed, configuration files can yield high-value information such as VPN credentials, admin credentials, network topology, firewall policies, and VPN peer configurations.

Amazon notes the actor used AI-assisted scripts to parse, decrypt and organise stolen configurations.


3) Post-VPN recon: automated discovery to find the next steps


After VPN access, the actor used a custom reconnaissance tool (with AI-generation hallmarks) and chained common open-source tooling for service discovery and vulnerability scanning.


4) Domain compromise attempts (and why it escalates quickly)


Amazon describes the intended use of standard offensive tooling to perform DCSync against domain controllers and extract credential material from Active Directory; in confirmed cases the attacker obtained complete credential databases.


5) Targeting backups: a classic ransomware precursor


The actor specifically targeted backup infrastructure (including Veeam Backup & Replication servers), consistent with pre-ransomware playbooks that aim to weaken recovery before encryption.



What to do now: a practical checklist


If you run FortiGate (or any edge appliance), the priority is to remove easy wins.


A) FortiGate / perimeter hardening


Amazon’s recommended actions are the right starting point:


  • Do not expose management interfaces to the internet. If remote administration is required, restrict access to known IP ranges and use a bastion host or out-of-band management.
  • Change default and common credentials (admin and VPN users).
  • Rotate SSL-VPN credentials where interfaces were (or may have been) internet-accessible.
  • Implement MFA for admin and VPN access.
  • Review configurations for unauthorised admin accounts or policy changes.
  • Audit VPN logs for unexpected geographic locations.


B) Credential hygiene (don’t underestimate password reuse)


Amazon highlights the risk that credentials extracted from configs can be reused against Active Directory.

Key actions:


  • Audit for password reuse between VPN creds and domain accounts.
  • Enforce unique, complex passwords for privileged roles.
  • Rotate service account credentials, especially around backup operations.


C) Detection: focus on behaviours, not just IOCs


Amazon notes that because legitimate open-source tools were used, IOC-only detection has limited value; organisations should prioritise behavioural detection.


They recommend monitoring for indicators including:


  • Unexpected DCSync operations (Event ID 4662 with replication-related GUIDs).
  • New scheduled tasks named to mimic legitimate Windows services.
  • Unusual remote management connections from VPN address pools.
  • LLMNR/NBT-NS poisoning artefacts.
  • Unauthorised access to backup credential stores and suspicious new accounts.


D) Backup hardening: protect recovery as if it’s a target (because it is)


Amazon’s guidance here is particularly relevant if you want to prevent “ransomware with no way back” scenarios:


  • Isolate backup servers from general network access.
  • Patch backup software and monitor for credential extraction activity.
  • Use immutable backup copies that cannot be modified even with administrative access.


Altiatech perspective: this is the new “baseline” threat model


This campaign is a reminder that “AI-augmented” doesn’t always mean “novel exploit.” Often it means faster, broader execution of known techniques. The organisations that reduce their risk fastest are the ones that close the obvious doors: exposed admin interfaces, weak credentials, missing MFA, flat networks, and untested recovery.

How Altiatech can help


If you want to reduce risk quickly (and prove it), we can support in practical phases:


  • Perimeter exposure review: confirm what is internet-reachable, remove exposed management, implement safe admin paths, and validate remote access controls.
  • Identity and privileged access uplift: MFA enforcement, privileged access controls, and credential hygiene hardening aligned to how your teams operate.
  • Compromise readiness: logging and detection engineering for post-exploitation behaviours (including AD replication abuse patterns) and a clear response runbook.
  • Backup and recovery resilience: backup segmentation, immutable backup design, and recovery testing so you can restore confidently under pressure.
  • Managed support: ongoing monitoring, patching cadence, and posture reporting that stays current as environments change.


Speak to Altiatech about your next steps:

Email: innovate@altiatech.com




or call 0330 332 5842 (Mon–Fri, 9am–5:30pm).


Contact us: https://www.altiatech.com/contact

Ready to move from ideas to delivery?


Whether you’re planning a cloud change, security uplift, cost governance initiative or a digital delivery programme, we can help you shape the scope and the right route to market.


Email:
innovate@altiatech.com or call 0330 332 5842 (Mon–Fri, 9am–5:30pm).


Main contact page: https://www.altiatech.com/contact

Person typing on laptop, cloud computing displayed on the screen, on a wooden table.
By Wafik Rozeik February 23, 2026
Explains why AI spend behaves differently and how anomaly management is becoming essential in FinOps to control costs, reduce risk, and improve cloud visibility.
Hand holding a phone displaying the Microsoft Copilot logo with the Microsoft logo blurred in the background.
By Simon Poole February 18, 2026
A practical governance checklist for Microsoft Copilot in 2026, using the Copilot Control System to manage risk, security, compliance, and oversight.
Route to market diagram: Bank to delivery platform, with steps like product mgmt and customer support.
By Simon Poole February 12, 2026
Explains what the Technology Services 4 (TS4) framework means for public sector buyers and how to procure Altiatech services through compliant routes.
Two people shaking hands between cloud data and data analytics dashboards.
By Simon Poole February 10, 2026
Explores where IT waste really comes from and how FinOps helps organisations regain control of cloud spend, improve efficiency, and turn cost visibility into advantage.
People discussing data and cloud infrastructure, near a government building.
By Simon Poole February 9, 2026
An overview of CCS Digital Outcomes 7 explaining Altiatech’s routes to market and how public sector organisations can procure services.
January 26, 2026
Cyberattacks, system failures, natural disasters, and human errors will occur—the question isn't if but when. Cyber resilience planning ensures organisations can withstand incidents, maintain critical operations during disruptions, and recover quickly when systems fail. It's not just about preventing attacks; it's about ensuring business continuity regardless of what goes wrong.
January 19, 2026
Manual user provisioning - the process of creating accounts and granting access through email requests and IT tickets - seems manageable for small organisations. As organisations grow, this approach creates mounting security risks, operational inefficiencies, and frustrated users waiting days for access they need immediately.
January 12, 2026
Multi-cloud strategies deliver flexibility, redundancy, and the ability to select the best platform for each workload. They also create complex security challenges, particularly around identity and access management. Each cloud provider offers different security models, tools, and terminology, making unified security difficult to achieve.
January 5, 2026
Privileged accounts—those with administrative rights to critical systems—represent the most attractive target for attackers. A single compromised privileged credential gives attackers complete control over infrastructure, data, and operations. Yet many organisations manage privileged access inadequately, creating unnecessary risk.
December 22, 2025
Identity and access management represents a critical security capability, yet many organisations struggle to assess whether their IAM implementation is truly effective. Identity governance maturity models provide a framework for evaluation, revealing gaps and priorities for improvement.