AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

AI-Powered Global Cyberattack: Russian-Speaking Actor Exploits 600+ FortiGate Devices Across 55 Nations
DATELINE: FEBRUARY 24, 2026 — Amazon Threat Intelligence (ATI) has uncovered a sophisticated cyber campaign leveraging commercial generative AI (GenAI) to compromise over 600 FortiGate network security appliances. Spanning 55 countries, this rapid assault signals a critical shift in cyber-offensive capabilities, moving from manual exploitation to high-speed, AI-automated penetration.
Key Takeaways
- The Actor: A Russian-speaking, financially motivated group likely operating as an Initial Access Broker (IAB).
- The Scale: 600+ compromised devices across 55 nations between Jan 11 and Feb 18, 2026.
- The Method: Use of commercial Large Language Models (LLMs) to automate social engineering, script iteration, and credential manipulation.
- The Target: Misconfigured "Shadow IT" and management interfaces lacking Multi-Factor Authentication (MFA).
The AI Catalyst: Scaling the "Human" Element
The most striking revelation in the ATI report is not a new software vulnerability, but the methodology used to exploit existing ones. The threat actor used commercially available GenAI services to bridge the gap between initial reconnaissance and full execution.
According to ATI findings, the actor utilized GenAI to:
- Generate High-Fidelity Social Engineering Lures: By using advanced prompt manipulation to bypass safety filters, the actor created contextually perfect communications in multiple languages. These lures—often disguised as "urgent firmware security alerts" or "IT compliance audits"—tricked regional administrators into revealing sensitive access data.
- Automate Exploit Scripting: While the campaign did not use a zero-day exploit, the actor used GenAI to rapidly iterate on known proof-of-concept (PoC) code. This allowed them to adapt scripts in real-time to bypass specific heuristic detections and signature-based security layers that would typically block static tools.
- Refine Credential Manipulation: The actor leveraged LLMs to analyze leaked datasets and predict password variations based on regional naming conventions and corporate patterns, significantly increasing the success rate of credential-stuffing attacks.
The "No Exploitation" Paradox
Crucially, Amazon noted that there was "no exploitation of FortiGate vulnerabilities" in the traditional sense. Instead, the actor targeted the management interface and administrative credentials of the devices.

The campaign weaponized AI to perform high-speed "brute-forcing of the human layer." By identifying "shadow IT"—unmanaged legacy devices or departmental installations forgotten by central IT—the actor achieved a hit rate that would have taken months to accomplish manually. AI allowed the actor to probe thousands of devices simultaneously, identifying the path of least resistance in seconds.
Geographical Footprint and Motivation
The 600+ compromised devices were distributed globally, with major clusters in Western Europe, Southeast Asia, and North America. ATI researchers categorize the actor as "financially motivated."
Evidence suggests the actor acted as an Initial Access Broker (IAB). After gaining access, they deployed lightweight persistence mechanisms before listing the credentials for sale on dark-web forums such as XSS and Exploit.in. These "beachheads" were likely intended for future ransomware deployment or large-scale data exfiltration.
Technical Implications for Edge Infrastructure
This campaign highlights the "Edge Gap." While organizations have hardened internal servers, edge devices like FortiGate firewalls remain primary targets.
"The speed of this campaign is what sets it apart," the report notes. "The window between an actor identifying a target and achieving administrative access has shrunk from days to seconds, thanks to LLM-assisted automation."
Mitigation and Response
Fortinet and Amazon are collaborating to notify affected customers. Security experts are urging immediate action to secure edge infrastructure:
- Enforce Multi-Factor Authentication (MFA): Every compromised device in this campaign lacked MFA on its management interface.
- Restrict Management Access: Ensure administrative interfaces are not reachable from the public internet. Use VPNs or trusted IP whitelisting to gate access.
- Audit "Shadow IT": Conduct comprehensive scans to identify unmanaged or forgotten edge devices that may be running legacy configurations.
- Monitor for AI-Driven Patterns: Look for anomalous, high-frequency login attempts that exhibit a robotic yet slightly varied cadence—a hallmark of AI-driven automation.
This incident serves as a definitive case study for 2026: the primary threat is no longer just "super-malware" created by AI, but the unprecedented scale at which AI allows mundane attack vectors to be deployed against the world's digital borders. Organizations must immediately audit and secure their edge infrastructure to withstand these increasingly automated assaults.