Threat Actor Claims to have Unauthorized Fortinet VPN Access to 50+ Organizations

A threat actor has claimed to possess unauthorized access to Fortinet VPNs of over 50 organizations in the United States.

The alarming announcement was made via a post on the dark web, where the cybercriminal offers this illicit access for a hefty price of $7,500.

The news has sent shockwaves through the cybersecurity community, raising concerns about the vulnerabilities in widely-used security systems.

Google News

RDP Access and Admin Privileges Compromise

The threat actor’s claims don’t stop at VPN access; they also state that they have Remote Desktop Protocol (RDP) access and administrative privileges to some of the compromised organizations.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

This access level could allow the attacker to execute commands, install malware, and exfiltrate sensitive data, posing a significant risk to the affected entities.

The sale of such access on the dark web demonstrates the increasing sophistication and boldness of cybercriminals.

Organizations that use Fortinet VPNs for secure remote access need to review their security protocols right away.

Cybersecurity experts recommend conducting thorough audits of VPN configurations, enforcing multi-factor authentication, and monitoring network traffic for unusual activities.

Additionally, organizations should stay informed about the latest threat intelligence and ensure that their systems are patched and up-to-date.

This incident underscores the critical need for robust cybersecurity measures and the importance of proactive threat detection and response strategies.

As cyber threats continue to evolve, organizations must remain vigilant and adaptive to safeguard their digital assets and maintain the trust of their stakeholders.

"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo

Dhivya
Divya is a Senior Journalist at Cyber Security news covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.