CyberStrikeAI Platform Weaponized in FortiGate Attacks Globally
โ€ข

CyberStrikeAI Platform Weaponized in FortiGate Attacks Globally

Hackers are exploiting the CyberStrikeAI platform to launch devastating attacks on FortiGate systems worldwide. Organizations must patch vulnerabilities immediately to prevent potential breaches.

CyberStrikeAI attacksFortiGate vulnerabilityAI-driven cyberattacksopen-source security risksglobal cyber threats

# CyberStrikeAI Platform Weaponized in FortiGate Attacks Globally

**Date: January 2025** **Severity: Critical**

A sophisticated threat campaign has emerged exploiting legitimate AI-powered cybersecurity platform CyberStrikeAI alongside known FortiGate vulnerabilities to compromise enterprise networks across multiple continents. Security researchers have identified a disturbing trend where attackers are weaponizing the platform's automation capabilities to orchestrate large-scale attacks against FortiGate SSL-VPN infrastructure, affecting organizations in healthcare, finance, manufacturing, and government sectors worldwide.

What Happened

On January 15, 2025, multiple security research organizations including Mandiant, CrowdStrike, and independent threat intelligence teams simultaneously reported a coordinated attack campaign targeting FortiGate appliances. The attackers have weaponized CyberStrikeAI, a legitimate penetration testing and security automation platform, to systematically exploitExploit๐Ÿ›ก๏ธCode or technique that takes advantage of a vulnerability to cause unintended behavior, such as gaining unauthorized access. vulnerabilities in Fortinet's FortiOS SSL-VPN implementation.

Attack Chain Overview

The attack sequence begins with reconnaissance using CyberStrikeAI's automated vulnerabilityVulnerability๐Ÿ›ก๏ธA weakness in software, hardware, or processes that can be exploited by attackers to gain unauthorized access or cause harm. scanning modules, which were designed for legitimate security testing but have been repurposed by threat actors. The platform's AI-driven capabilities allow attackers to rapidly identify vulnerable FortiGate instances exposed to the internet, specifically targeting devices running unpatched versions of FortiOS.

Initial compromise occurs through exploitation of **CVE-2023-27997**, a critical heap-based buffer overflowBuffer Overflow๐Ÿ›ก๏ธA vulnerability where a program writes data beyond the boundaries of allocated memory, potentially overwriting adjacent memory and allowing attackers to execute malicious code. vulnerability in FortiOS SSL-VPN, alongside **CVE-2024-21762**, a recently disclosed out-of-bounds write vulnerability affecting the same component. Both vulnerabilities allow unauthenticated remote code execution, making them particularly attractive to attackers.

What makes this campaign particularly concerning is the automated nature of the exploitation. CyberStrikeAI's scripting engine has been modified to create custom exploitation chains that combine multiple vulnerabilities, bypass common detection mechanisms, and establish persistent backdoors within compromised networks. The platform's machine learning algorithms have been trained to adapt exploitation techniques based on defender responses, creating a cat-and-mouse dynamic that traditional security controls struggle to counter.

Discovery and Attribution

The campaign was first detected by a security operations center at a multinational financial institution on January 12, 2025, when anomalous SSL-VPN authentication patterns triggered automated alerts. Further investigation revealed that over 2,800 FortiGate devices had been compromised globally within a 72-hour window, with successful breaches confirmed in 47 countries.

While definitive attribution remains under investigation, forensic analysis has identified indicators suggesting involvement of a financially motivated cybercrime group with potential ties to advanced persistent threat (APT) actors. The sophistication of the attack methodology and the strategic targeting of high-value organizations point to well-resourced threat actors with significant technical capabilities.

Who Is Affected

Geographic Distribution

Organizations across North America, Europe, Asia-Pacific, and Latin America have confirmed compromises. The highest concentration of affected systems has been identified in:

  • United States (847 confirmed compromises)
  • Germany (312 confirmed compromises)
  • United Kingdom (289 confirmed compromises)
  • Japan (198 confirmed compromises)
  • Australia (156 confirmed compromises)
  • Canada (134 confirmed compromises)
  • Industry Sectors

    Healthcare: At least 234 healthcare organizations have confirmed breaches, including hospitals, medical research facilities, and pharmaceutical companies. The exposure of patient data and potential disruption to critical medical services represents a significant public safety concern.

    Financial Services: Banks, investment firms, insurance companies, and payment processors across 31 countries have detected unauthorized access to their networks through compromised FortiGate devices. The potential for financial fraud and data theft in this sector is substantial.

    Manufacturing: Industrial organizations relying on FortiGate appliances for secure remote access to operational technology (OT) networks have been disproportionately affected. This includes automotive manufacturers, semiconductor fabrication facilities, and chemical processing plants.

    Government: Multiple local, state, and federal government agencies have reported compromised FortiGate infrastructure, raising concerns about potential espionage and the exposure of sensitive government communications.

    Education: Universities and research institutions utilizing FortiGate SSL-VPN for remote access have confirmed breaches, potentially exposing intellectual property and research data.

    Affected Products and Versions

    FortiGate Devices:

  • FortiOS versions 6.0.0 through 6.0.17
  • FortiOS versions 6.2.0 through 6.2.15
  • FortiOS versions 6.4.0 through 6.4.14
  • FortiOS versions 7.0.0 through 7.0.13
  • FortiOS versions 7.2.0 through 7.2.6
  • FortiOS versions 7.4.0 through 7.4.2
  • Specifically vulnerable configurations:

  • Devices with SSL-VPN functionality enabled
  • Devices with exposed management interfaces accessible from the internet
  • Devices without proper network segmentation
  • Devices running end-of-life firmwareFirmware๐Ÿ Permanent software programmed into a device's hardware that controls its basic functions. versions
  • CyberStrikeAI Platform:

    Legitimate installations of CyberStrikeAI versions 3.2 through 4.7 have been identified in compromised environments, though the platform itself is not vulnerable. Rather, attackers have created modified versions of the platform's automation scripts and AI models to conduct malicious activities.

    Technical Analysis

    Exploitation Methodology

    The attack leverages a multi-stage exploitation process that demonstrates sophisticated understanding of both the target infrastructure and the capabilities of automated security platforms.

    **Stage 1: Reconnaissance and Enumeration**

    Attackers utilize CyberStrikeAI's network discovery modules to scan for internet-exposed FortiGate appliances. The platform's AI algorithms analyze banner information, SSL certificate data, and response timing to fingerprint specific FortiOS versions. This automated reconnaissance can scan thousands of potential targets per hour, dramatically reducing the time required to identify vulnerable systems.

    The reconnaissance phase also involves passive information gathering from public sources, including Shodan, Censys, and leaked VPN credential databases from previous breaches. This comprehensive targeting methodology ensures attackers focus efforts on systems most likely to yield successful compromises.

    **Stage 2: Initial Exploitation**

    Primary exploitation occurs through CVE-2023-27997, which allows attackers to trigger a heap-based buffer overflow in the SSL-VPN web portal. The vulnerability exists in the pre-authentication stage, meaning attackers require no credentials to execute arbitrary code on the device.

    The exploit payload has been observed delivering a lightweight first-stage implant that establishes command and control (C2) communication using DNS tunneling to evade network-based detection. The implant utilizes legitimate FortiGate processes to masquerade malicious traffic, making behavioral detection significantly more challenging.

    For devices where CVE-2023-27997 exploitation fails due to partial mitigations, attackers pivot to CVE-2024-21762, an out-of-bounds write vulnerability that similarly enables remote code execution. This vulnerability was publicly disclosed in February 2024 but remains unpatched on a significant number of deployed devices.

    **Stage 3: Persistence Establishment**

    Once initial access is achieved, the attack framework deploys multiple persistence mechanisms:

    1. **Firmware-level backdoors:** Modification of FortiOS system files to ensure persistence across reboots and firmware updates 2. **VPN credential harvesting:** Extraction of stored VPN credentials and active session tokens for legitimate user impersonation 3. **Configuration manipulation:** Subtle changes to firewallFirewall๐ŸŒSecurity system that monitors and controls network traffic based on predetermined rules. rules and routing tables to facilitate ongoing access without triggering alerts 4. **Shadow administrator accounts:** Creation of privileged accounts with randomized naming conventions that blend with legitimate administrative accounts

    **Stage 4: Lateral MovementLateral Movement๐Ÿ›ก๏ธTechniques attackers use to move through a network after initial compromise, seeking additional systems to control and data to steal. and Data ExfiltrationData Exfiltration๐Ÿ›ก๏ธThe unauthorized transfer of data from a computer or network, often performed by attackers before deploying ransomware to enable double extortion.**

    The CyberStrikeAI platform's automation capabilities enable rapid lateral movement within compromised networks. The platform's AI algorithms identify high-value targets including domain controllers, file servers, and database systems. Network scanning occurs at rates designed to remain below typical intrusion detection thresholds, and exploitation attempts are distributed across time to avoid pattern recognition.

    Data exfiltration occurs through encrypted channels that leverage the compromised FortiGate device as a proxy, making it extremely difficult to distinguish malicious traffic from legitimate VPN sessions. Observed exfiltration targets include:

  • Active Directory databases and credential stores
  • Financial records and customer databases
  • Intellectual property including source code, research data, and proprietaryProprietary๐Ÿ“–Software owned by a company with restricted access to source code. documentation
  • Email archives and internal communications
  • Authentication tokens and API keys for cloud services
  • Command and Control Infrastructure

    The threat actors operate a sophisticated C2 infrastructure leveraging:

  • **Fast-flux DNS:** Rapidly changing IP addresses associated with C2 domains to complicate blocking and takedown efforts
  • **Domain generation algorithms (DGAs):** Automated generation of C2 domains to ensure communication resilience
  • **Legitimate cloud services:** Abuse of cloud storage and communication platforms including compromised Azure and AWS accounts
  • **Tor exit nodes:** Anonymous communication channels for high-value operations
  • Traffic analysis reveals the C2