By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
Computing

Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries

News Room
Last updated: 2026/03/03 at 10:23 AM
News Room Published 3 March 2026
Share
Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
SHARE

Ravie LakshmananMar 03, 2026Vulnerability / Artificial Intelligence

The threat actor behind the recently disclosed artificial intelligence (AI)-assisted campaign targeting Fortinet FortiGate appliances leveraged an open-source, AI-native security testing platform called CyberStrikeAI to execute the attacks.

The new findings come from Team Cymru, which detected its use following an analysis of the IP address (“212.11.64[.]250”) that was used by the suspected Russian-speaking threat actor to conduct automated mass scanning for vulnerable appliances.

CyberStrikeAI is an “open-source artificial intelligence (AI) offensive security tool (OST) developed by a China-based developer who we assess has some ties to the Chinese government,” security researcher Will Thomas (aka @BushidoToken) said.

Details of the AI-powered activity came to light last month when Amazon Threat Intelligence said it detected the unknown attacker systematically targeting FortiGate devices using generative artificial intelligence (AI) services like Anthropic Claude and DeepSeek, compromising over 600 appliances in 55 countries.

According to the description in its GitHub repository, CyberStrikeAI is built in Go and integrates more than 100 security tools to enable vulnerability discovery, attack-chain analysis, knowledge retrieval, and result visualization. It’s maintained by a Chinese developer who goes by the online alias Ed1s0nZ.

Team Cymru said it observed 21 unique IP addresses running CyberStrikeAI between January 20 and February 26, 2026, with servers primarily hosted in China, Singapore, and Hong Kong. Additional servers related to the tool have been detected in the U.S., Japan, and Switzerland.

The Ed1s0nZ account, besides hosting CyberStrikeAI, has published several other tools that demonstrate their interest in exploitation and jailbreaking AI models –

  • watermark-tool, to add invisible digital watermarks to documents.
  • banana_blackmail, a Golang-based ransomware,
  • PrivHunterAI, a Golang-based tool that uses Kimi, DeepSeek, and GPT models to detect privilege escalation vulnerabilities.
  • ChatGPTJailbreak, which contains a README.md file with prompts to jailbreak OpenAI ChatGPT by tricking it into entering a Do Anything Now (DAN) mode or asking it to act as ChatGPT with Developer Mode enabled.
  • InfiltrateX, a Golang-based scanner for detecting privilege escalation vulnerabilities.
  • VigilantEye, a Golang-based tool that monitors the disclosure of sensitive information, such as phone numbers and ID card numbers, in databases. It’s configured to send an alert via a WeChat Work bot if a potential data breach is detected.

“Further, Ed1s0nZ’s GitHub activities indicate they interact with organisations that support potentially Chinese government state-sponsored cyber operations,” Thomas said. “This includes Chinese private sector firms that have known ties to the Chinese Ministry of State Security (MSS).”

One such company the developer has interacted with is Knownsec 404, a Chinese security vendor that suffered a major leak of more than 12,000 internal documents late last year, exposing the firm’s employee data, government clientele, hacking tools, large volumes of stolen data such as South Korean call logs and information related to Taiwan’s critical infrastructure organizations, and the inner workings of ongoing cyber operations targeting other countries.

“Ostensibly, KnownSec appeared to be just another security company, but this is only a half truth,” DomainTools noted in an analysis published this January, describing it as a “state-aligned cyber contractor” capable of supporting Chinese national security, intelligence, and military objectives.

“In reality, […] it has a shadow organization that works for the PLA, MSS, and the organs of the Chinese security state. This leak exposes a company that operates far beyond the role of a typical cybersecurity vendor. Tools like ZoomEye and the Critical Infrastructure Target Library give China a global reconnaissance system that catalogs millions of foreign IPs, domains, and organizations mapped by sector, geography, and strategic value.”

Ed1s0nZ has also been observed making active modifications to a README.md file located in an eponymous repository, removing references to them having been honored with the Level 2 Contribution Award to the China National Vulnerability Database of Information Security (CNNVD). The developer has also claimed that “everything shared here is purely for research and learning.”

According to research published by Bitsight last month, China maintains two different vulnerability databases: CNNVD and the Chinese National Vulnerability Database (CNVD). While CNNVD is overseen by the Ministry of State Security, CNVD is controlled by CNCERT. Previous findings from Recorded Future have revealed that CNNVD takes longer to publish vulnerabilities with higher CVSS scores than vulnerabilities with lower ones.

“The developer’s recent attempt to scrub references to the CNNVD from their GitHub profile points to an active effort to obscure these state ties, likely to protect the tool’s operational viability as its popularity grows,” Thomas said. “The adoption of CyberStrikeAI is poised to accelerate, representing a concerning evolution in the proliferation of AI-augmented offensive security tools.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article M5 MacBook Air vs M4 MacBook Air: What’s actually changed? – 9to5Mac M5 MacBook Air vs M4 MacBook Air: What’s actually changed? – 9to5Mac
Next Article Vivantio Review: Customizable, Enterprise-Friendly Help Desk Management Vivantio Review: Customizable, Enterprise-Friendly Help Desk Management
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Privacy Isn’t a Feature, It’s an Obligation | HackerNoon
Privacy Isn’t a Feature, It’s an Obligation | HackerNoon
Computing
NASA’s Artemis II Is the First Crewed Moon Mission Since 1972. Why Are We Going Back?
NASA’s Artemis II Is the First Crewed Moon Mission Since 1972. Why Are We Going Back?
News
Debian Is Figuring Out How Age Verification Laws Will Impact It
Debian Is Figuring Out How Age Verification Laws Will Impact It
Computing
AMD or Nvidia eGPUs can work on Apple Silicon Macs, but not for graphic acceleration
AMD or Nvidia eGPUs can work on Apple Silicon Macs, but not for graphic acceleration
News

You Might also Like

Privacy Isn’t a Feature, It’s an Obligation | HackerNoon
Computing

Privacy Isn’t a Feature, It’s an Obligation | HackerNoon

18 Min Read
Debian Is Figuring Out How Age Verification Laws Will Impact It
Computing

Debian Is Figuring Out How Age Verification Laws Will Impact It

3 Min Read
Alibaba tightens partner ranks as e-commerce chief Jiang Fan rejoins core leadership circle · TechNode
Computing

Alibaba tightens partner ranks as e-commerce chief Jiang Fan rejoins core leadership circle · TechNode

4 Min Read
8 Things to Know Before You Publish Your First YouTube Video
Computing

8 Things to Know Before You Publish Your First YouTube Video

13 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?