FBI issues warning about Fortinet vulnerabilities after APT group hacks local gov’t office

The FBI issued a flash alert on Thursday after a local government office was attacked through Fortinet vulnerabilities earlier this month. 

The release said an “APT actor group almost certainly exploited a Fortigate appliance to access a webserver hosting the domain for a U.S. municipal government.” 

“The APT actors likely created an account with the username ‘elie’ to further enable malicious activity on the network,” according to the white flash alert. 

The FBI did not say which local government was attacked, but the latest release follows multiple warnings about cyberattackers exploiting vulnerabilities related to Fortinet. 

“As of at least May 2021, an the FBI and the CISA previously warned in April 2021 that APT actors had gained access to devices on ports 4443, 8443, and 10443 for Fortinet FortiOS CVE-2018-13379, and enumerated devices for FortiOS CVE-2020- 12812 and FortiOS CVE-2019-5591,” the FBI said. 

By breaking into systems through Fortinet vulnerabilities, cybercriminals or nation states can “conduct data exfiltration, data encryption, or other malicious activity.” The release noted that from their investigations, it seems that the actors behind the attack are focused on exploiting this specific vulnerability as opposed to attacking specific targets or industries. 

All of the vulnerabilities listed relate to Fortinet FortiOS, an operating system that is the backbone of Fortinet Security Fabric. The company said it was designed to offer better enterprise security, cloud deployments, and centralized networks. But despite the warnings, it appears APT groups are still able to leverage the vulnerabilities. 

Sean Nikkel, senior cyber threat intel analyst at Digital Shadows, noted that all of the vulnerabilities listed in the notice are at least one year old, spotlighting the need for government institutions to improve patch management. 

“It’s good to get a reminder because it’s not just Fortinet threat actors are targeting. Using least privilege principles, performing regular updates and patching, using network segmentation, using backups, and strengthening login processes all go a long way to securing the estate,” Nikkel said. “It’s safe to say most criminal groups and APTs are counting on enterprises not being great at doing all of these things, and their continued success only highlights that fact.”

Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *