China-Backed Cybercriminals Exploit Fortinet Vulnerability, Infecting 20,000 Machines Worldwide

Jun 12, 2024Newsroom

Hackers with ties to the Chinese government exploited a critical vulnerability in Fortinet FortiGate systems, compromising 20,000 systems globally between 2022 and 2023.

China-Backed Hackers Exploit Fortinet Flaw, Infecting 20,000 Systems Globally

Jun 12, 2024Newsroom

China-Backed Hackers Exploit Fortinet Flaw, Infecting 20,000 Systems Globally

Hackers with ties to the Chinese government exploited a critical vulnerability in Fortinet FortiGate systems, compromising 20,000 systems globally between 2022 and 2023. This indicates a wider impact than previously acknowledged.

“The state-sponsored group behind this cyber operation had knowledge of the vulnerability in FortiGate systems at least two months before it was publicly disclosed by Fortinet,” said the Dutch National Cyber Security Centre (NCSC) stated in a recent report. “During this so-called zero-day period, the group managed to infect 14,000 devices on its own.”

The attack was directed at numerous Western governments, global organizations, and a significant number of companies in the defense sector. The specific entities targeted were not disclosed.

This information supplements an earlier alert from February 2024, which revealed that hackers had infiltrated a Dutch military network by exploiting CVE-2022-42475 (CVSS score: 9.8), enabling remote code execution.

Cybersecurity

This security breach enabled the installation of a persistently accessible backdoor named COATHANGER from a server controlled by the cybercriminals. This backdoor was designed to allow remote control over the compromised devices and serve as a launching pad for additional malicious software.

The NCSC highlighted that the attackers chose to deploy the malware well after gaining entry initially, aiming to maintain control over the devices. However, it remains unclear how many devices were actually infected with the backdoor.

This recent development once again emphasizes the trend of cyber attacks targeting edge devices to infiltrate networks of interest.

“Considering the security issues associated with edge devices, they are becoming a popular target for malicious agents,” the NCSC explained. “These devices are typically located at the periphery of the IT network and often have direct internet connectivity. Moreover, they are frequently not covered by Endpoint Detection and Response (EDR) solutions.”

Found this article intriguing? Follow us on Twitter and LinkedIn for more exclusive content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.