Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsAmazon: AI-Assisted Hacker Breached 600 Fortinet Firewalls in 5 Weeks
Amazon: AI-Assisted Hacker Breached 600 Fortinet Firewalls in 5 Weeks
CybersecurityEnterpriseDefenseAI

Amazon: AI-Assisted Hacker Breached 600 Fortinet Firewalls in 5 Weeks

•February 21, 2026
0
BleepingComputer
BleepingComputer•Feb 21, 2026

Companies Mentioned

Amazon

Amazon

AMZN

Fortinet

Fortinet

FTNT

Veeam

Veeam

Google

Google

GOOG

DeepSeek

DeepSeek

Why It Matters

The breach shows generative AI can amplify low‑skill actors, turning simple credential‑spraying into large‑scale network intrusions and forcing organizations to rethink edge device exposure and MFA enforcement.

Key Takeaways

  • •AI tools automated brute‑force on exposed FortiGate interfaces.
  • •Over 600 firewalls breached across 55 countries in five weeks.
  • •Threat actor used LLMs for scripts, reconnaissance, and planning.
  • •Lack of MFA and weak passwords enabled rapid compromise.
  • •Backup systems targeted to facilitate ransomware before encryption.

Pulse Analysis

The rise of generative AI as a force multiplier in cybercrime is no longer speculative. Amazon’s latest report details a coordinated campaign where large language models supplied step‑by‑step attack playbooks, auto‑generated reconnaissance scripts, and even parsed configuration files extracted from compromised firewalls. By feeding raw network topology into AI services, the threat actor could instantly produce tailored lateral‑movement plans, dramatically shortening the kill chain and expanding the attack surface without deep technical expertise.

Technical analysis reveals that the adversary focused on internet‑exposed FortiGate management interfaces, exploiting default or weak credentials and the absence of multi‑factor authentication. Once inside, AI‑assisted tools written in Go and Python decrypted VPN credentials, harvested SSL‑VPN user data, and mapped internal routing tables. The operation also targeted Veeam backup servers, using custom PowerShell scripts to extract credentials before potential ransomware deployment. The use of an in‑house Model Context Protocol (MCP) server, dubbed ARXON, illustrates a sophisticated feedback loop where reconnaissance data is fed to LLMs, which then generate actionable commands for automated execution.

For defenders, the lesson is clear: traditional perimeter hardening is insufficient when AI can automate the exploitation of misconfigurations. Organizations must enforce strict MFA on all privileged interfaces, regularly audit exposed ports, and segment backup infrastructure from production networks. Moreover, continuous monitoring for AI‑generated code artifacts—such as redundant comments or naïve JSON parsing—can serve as an early indicator of malicious toolchains. As AI services become more accessible, the security community will need to develop detection capabilities that focus on behavioral anomalies rather than signature‑based threats, ensuring that the same technology that powers innovation does not become a weapon against enterprise resilience.

Amazon: AI-assisted hacker breached 600 Fortinet firewalls in 5 weeks

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...