By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
Computing

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

News Room
Last updated: 2026/03/10 at 2:15 PM
News Room Published 10 March 2026
Share
FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
SHARE

Ravie LakshmananMar 10, 2026Network Security / Vulnerability

Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim networks. 

The activity involves the exploitation of recently disclosed security vulnerabilities or weak credentials to extract configuration files containing service account credentials and network topology information, SentinelOne said in a report published today. The security outfit said the campaign has singled out environments tied to healthcare, government, and managed service providers.

“FortiGate network appliances have considerable access to the environments they were installed to protect,” security researchers Alex Delamotte, Stephen Bromfield, Mary Braden Murphy, and Amey Patne said. “In many configurations, this includes service accounts which are connected to the authentication infrastructure, such as Active Directory (AD) and Lightweight Directory Access Protocol (LDAP).”

“This setup can enable the appliance to map roles to specific users by fetching attributes about the connection that’s being analyzed and correlating with the Directory information, which is useful in cases where role-based policies are set or for increasing response speed for network security alerts detected by the device.”

However, the cybersecurity company noted that such access could be exploited by attackers who break into FortiGate devices through known vulnerabilities (e.g., CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858) or misconfigurations.

In one incident, the attackers are said to have breached a FortiGate appliance in November 2025 to create a new local administrator account named “support” and used it to set up four new firewall policies that allowed the account to traverse all zones without any restrictions.

The threat actor then kept periodically checking to ensure the device was accessible, an action consistent with an initial access broker (IAB) establishing a foothold and selling it to other criminal actors for monetary gain. The next phase of the activity was detected in February 2026 when an attacker likely extracted the configuration file containing encrypted service account LDAP credentials.

“Evidence demonstrates the attacker authenticated to the AD using clear text credentials from the fortidcagent service account, suggesting the attacker decrypted the configuration file and extracted the service account credentials,” SentinelOne said.

The attacker then leveraged the service account to authenticate to the victim’s environment and enroll rogue workstations in the AD, allowing them deeper access. Following this step, network scanning was initiated, at which point the breach was detected, and further lateral movement was halted.

In another case investigated in late January 2026, attackers swiftly moved from firewall access to deploying remote access tools like Pulseway and MeshAgent. In addition, the threat actor downloaded malware from a cloud storage bucket via PowerShell from Amazon Web Services (AWS) infrastructure.

The Java malware, launched via DLL side-loading, was used to exfiltrate the contents of the NTDS.dit file and SYSTEM registry hive to an external server (“172.67.196[.]232”) over port 443.

“While the actor may have attempted to crack passwords from the data, no such credential usage was identified between the time of credential harvesting and incident containment,” SentinelOne added.

“NGFW appliances have become ubiquitous because they provide strong network monitoring capabilities for organizations by integrating security controls of a firewall with other management features, such as AD,” it added. “However, these devices are high-value targets for actors with a variety of motivations and skill levels, from state-aligned actors conducting espionage to financially motivated attacks such as ransomware.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Best Digital Audio Workstations (DAWs) We’ve Tested for 2026 The Best Digital Audio Workstations (DAWs) We’ve Tested for 2026
Next Article We’ve Slept on Nearly 30 Pillows. Here Are the Best Ones We’ve Slept on Nearly 30 Pillows. Here Are the Best Ones
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Apple AirPods Max 2 are  off for Amazon’s Big Spring Sale: Preorder deal
Apple AirPods Max 2 are $20 off for Amazon’s Big Spring Sale: Preorder deal
News
NVIDIA’s special edition RTX 5090 DD for China to launch in August with up to 30% performance cut · TechNode
NVIDIA’s special edition RTX 5090 DD for China to launch in August with up to 30% performance cut · TechNode
Computing
4 Cheap Alternatives To Your Monitor’s Built-In Speakers – BGR
4 Cheap Alternatives To Your Monitor’s Built-In Speakers – BGR
News
This Magnificent Software Stock Is Down 35%. Buy It Before It Sets a New All-Time High.
This Magnificent Software Stock Is Down 35%. Buy It Before It Sets a New All-Time High.
Software

You Might also Like

NVIDIA’s special edition RTX 5090 DD for China to launch in August with up to 30% performance cut · TechNode
Computing

NVIDIA’s special edition RTX 5090 DD for China to launch in August with up to 30% performance cut · TechNode

1 Min Read
Driving Sales on Instagram: How to Make Money on IG in 2025
Computing

Driving Sales on Instagram: How to Make Money on IG in 2025

5 Min Read
Rust 1.76.0: What Changes Did It Bring In? | HackerNoon
Computing

Rust 1.76.0: What Changes Did It Bring In? | HackerNoon

3 Min Read
Tencent probes abusive language incident involving Yuanbao AI assistant · TechNode
Computing

Tencent probes abusive language incident involving Yuanbao AI assistant · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?