Amazon AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks Without Zero-Day Exploits

Feb 23, 2026

Amazon’s threat intelligence team has uncovered a major AI-powered cyberattack that breached over 600 Fortinet FortiGate firewalls across more than 55 countries within a five-week period — highlighting how generative AI tools are lowering the bar for large-scale intrusions.

According to a report by CJ Moses, Chief Information Security Officer of Amazon Integrated Security, the campaign ran from January 11 to February 18, 2026 and did not exploit any zero-day software vulnerabilities. Instead, the threat actor leveraged exposed firewall management interfaces and weak credentials without multifactor authentication (MFA) to gain access — dramatically scaling operations with the help of AI-assisted tooling.

Attack Summary

Attribute

Details

Timeframe

Jan 11 – Feb 18, 2026

Targets

Fortinet FortiGate firewalls across 55+ countries

Initial Access

Exposed management interfaces + weak passwords

Exploit Technique

No zero-day; brute-force + credential weaknesses

AI-Assisted Activities

Reconnaissance automation, scripting, network analysis

Credential & Config Theft

Administrative & SSL-VPN credentials, routing data, VPN configs

Post-Access Actions

Internal reconnaissance, mapping, lateral movement planning

Threat Skill Level

Low-to-medium, amplified by AI tooling

Compiled from Amazon Integrated Security and third-party analysis.

How the Attack Unfolded

Opportunistic Targeting and Weak Credentials

Instead of leveraging software vulnerabilities, the attacker scanned for FortiGate management interfaces exposed to the internet on common ports (443, 8443, 10443, and 4443). Devices lacking strong authentication — particularly those without MFA — were compromised through brute-force attempts against weak or reused credentials.

Once access was achieved, the threat actor exfiltrated firewall configuration files, which typically included:

  • SSL-VPN usernames and recoverable passwords

  • Administrative credentials

  • Complete firewall policies and topology

  • IPsec VPN peer configurations and routing information

These configuration backups became a rich source for internal network reconnaissance and future pivoting.

AI-Assisted Tools Were Central to the Campaign

Amazon’s investigation found that the threat actor relied on AI-assisted Python and Go tools to parse, decrypt, and analyze stolen configuration files — and to automate many aspects of post-access activity.

Analysis of the tooling revealed several markers of AI generation, such as:

  • Redundant comments reflecting AI-style verbosity

  • Simplistic architectural design

  • Naive parsing techniques

  • Sparse or placeholder documentation

While not robust against complex or hardened environments, these tools facilitated rapid reconnaissance and lateral movement planning that would traditionally require more advanced expertise.

AI in Operational Planning and Execution

According to the report, the attacker used multiple commercial generative AI services to accelerate the campaign:

  • Drafting step-by-step attack methodologies

  • Generating custom code in various languages

  • Organizing reconnaissance frameworks

  • Planning lateral movement strategies

  • Creating operational documentation

In one documented instance, the attacker uploaded an entire internal victim network topology — including IP addresses, hostnames, and credentials — to an AI service to help strategize further exploitation.

Lessons for Defenders

Amazon’s report underscores that AI-powered attacks aren’t threats only to large organizations with high-profile targets — even basic perimeter weaknesses and poor credential hygiene can be weaponized at scale when combined with AI-driven automation.

Recommended defensive measures include:

  • Avoid exposing firewall management interfaces to the internet

  • Enforce MFA for all administrative and VPN accounts

  • Eliminate credentials reuse between systems

  • Harden backup infrastructure

  • Audit SSH activity and creation of new VPN accounts

These controls, while fundamental, remain among the most effective barriers against opportunistic attackers empowered by AI.

Final Takeaway

This widespread FortiGate compromise highlights a pivotal shift in how threat actors operate: commercial AI services are lowering the technical threshold for impactful intrusions. Even attackers with modest skills can achieve large-scale compromise and automation when supported by generative AI tools — reinforcing the need for strong security hygiene as a first line of defense.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Amazon AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks Without Zero-Day Exploits
Amazon AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks Without Zero-Day Exploits
Amazon AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks Without Zero-Day Exploits
Amazon AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks Without Zero-Day Exploits

Amazon AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks Without Zero-Day Exploits

Amazon AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks Without Zero-Day Exploits

Amazon AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks Without Zero-Day Exploits

Amazon AI-Assisted Hacker Breaches 600 FortiGate Firewalls in 5 Weeks Without Zero-Day Exploits

Feb 23, 2026

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Feb 19, 2026

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Feb 17, 2026

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Feb 13, 2026

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Feb 13, 2026

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

Feb 11, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.