SIGNALS WEEKLY: How AI Is Turbocharging Attacks on 600+ FortiGate Firewalls

Your firewall isn’t the perimeter. It’s the onboarding portal. 🔥

SIGNALS WEEKLY: How AI Is Turbocharging Attacks on 600+ FortiGate Firewalls

TL;DR

  • [Vulnerabilities] Active, multi-actor exploitation of internet-exposed management planes (Dell RecoverPoint for VMs, BeyondTrust Remote Support/Privileged Remote Access, Ivanti EPMM) is yielding pre-auth RCE, webshell deployment, and rapid pivots into VMware, AD, and backups; patching must be paired with compromise assessment to find startup-script and webroot persistence.
  • [Threat Actors] Both state-linked and financially motivated actors are industrializing edge compromise: UNC6201 (likely PRC) weaponizing Dell RecoverPoint zero-day with Tomcat WAR + custom webshells, while Russian-speaking criminals leverage commercial genAI to script and scale exploitation of 600+ FortiGate devices for configuration/credential theft and deeper access.
  • [OT/Cloud/Geopolitics] OT intrusions and Russian operations against Ukraine’s energy sector are shifting from immediate disruption to control-loop and infrastructure mapping to support kinetic targeting; in parallel, cloud intrusions increasingly rely on misconfigurations, credential abuse, and native APIs (snapshots, backups, keys) for “cloud ransomware” and destructive actions that look like legitimate admin activity.

AlphaHunt

Stop doomscrolling, start decisioning. We chewed through the muck so your team doesn’t have to. → Subscribe!

Like this? Forward this to a friend!

(Have feedback? Did something resonate with you? Did something annoy you? Just hit reply! :))


Current Stories

TL;DR

  • [Vulnerabilities] Edge/remote-access exploitation wave: multiple internet-exposed management planes are being hit with pre-auth RCE / default-credential paths, followed by webshelling and fast pivots into identity/virtualization.

    • Dell RecoverPoint for VMs (CVE-2026-22769, CVSS 10.0): UNC6201 (suspected PRC-nexus) exploited since at least mid-2024; Tomcat Manager WAR deployment + SLAYSTYLE webshell, persistence via boot-time script modification, and VMware pivoting (e.g., “Ghost NICs”, iptables SPA).

    • BeyondTrust Remote Support / Privileged Remote Access (CVE-2026-1731): active exploitation observed with post-exploitation including account creation, webshells, data theft, and RATs (e.g., VShell, SparkRAT).

    • Ivanti EPMM (CVE-2026-1281 / CVE-2026-1340): two zero-days under widespread exploitation; activity includes reverse shells, JSP webshell writes, recon, and attempts to establish durable access.

  • [Geopolitics] Ukraine reports Russian cyber operations against energy networks increasingly used for targeting intelligence (facility mapping, repair tracking, damage assessment) to support missile strikes, rather than immediate disruption.

  • [Vulnerabilities] CISA added two actively exploited Roundcube Webmail issues (CVE-2025-49113, CVE-2025-68461) to KEV, signaling renewed webmail targeting and urgent patch prioritization.

References


AlphaHunt Converge - Plug in your Flight Crew

Get intelligence where it counts. No dashboards. No detours. AlphaHunt Converge teases out your intent, reviews the results and delivers actionable intel right inside Slack. We turn noise into signal and analysts into force multipliers.

CTA Image

Anticipate, Don’t Chase.

Plug it In!

Emerging Stories, Forecasts, Detection Opportunities and References...