Brute-Force Attacks Surge Against Fortinet SSL VPN Devices Globally

Brute-Force Attacks Surge Against Fortinet SSL VPNs, Signal Potential Security Vulnerabilities

  • Researchers report a sharp rise in brute-force attacks targeting Fortinet SSL VPN devices.
  • Over 780 unique IP addresses were involved in the attacks observed on August 3, 2025.
  • Malicious traffic originated from multiple countries and targeted systems worldwide.
  • Attack patterns shifted after August 5 to also focus on FortiManager services.
  • Activity often predicts the discovery of security flaws in affected technologies within weeks.

Cybersecurity researchers have detected a significant increase in brute-force attempts against Fortinet SSL VPN systems. Threat intelligence firm GreyNoise observed this coordinated campaign on August 3, 2025, identifying participation from more than 780 unique IP addresses.

- Advertisement -

In the 24 hours before the report, 56 unique IP addresses engaged in these attacks. GreyNoise classified all of them as malicious. The origins of this traffic included the United States, Canada, Russia, and the Netherlands. Attackers aimed at targets located in the United States, Hong Kong, Brazil, Spain, and Japan.

According to GreyNoise, the attackers specifically targeted Fortinet SSL VPNs, not using random or opportunistic methods. “Critically, the observed traffic was also targeting our FortiOS profile, suggesting deliberate and precise targeting of Fortinet’s SSL VPNs,” the company said. Researchers detected two main waves: an ongoing long-term attack connected to a single network signature, and a more concentrated short-term burst with a separate signature.

After August 5, the firm saw a change in attack focus. “While the August 3 traffic has targeted the FortiOS profile, traffic fingerprinted with TCP and client signatures—a meta signature—from August 5 onward was not hitting FortiOS,” GreyNoise explained. Instead, this latter wave targeted FortiManager services. This shift signaled to researchers that attackers may be reusing the same tools or infrastructure to go after different Fortinet systems.

Further investigation found that similar attack fingerprints were first noticed in June, possibly indicating the initial use or testing of brute-force tools on a home network or via a residential proxy.

- Advertisement -

GreyNoise highlighted that spikes in attacks like these often come before the public disclosure of a new vulnerability in the targeted technology, usually within six weeks. These patterns commonly impact enterprise systems such as VPNs and firewalls, which are frequent targets for sophisticated threat groups.

The Hacker News has contacted Fortinet for comment and will provide updates if a response is received.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Ether Tops $2K as Derivatives Leverage Hits Record High

Ether surged past $2,000 on Monday as speculative trading intensified, with over 110,000 ETH...

SHIB Surge? 131 Billion Tokens Exit Exchanges

131 billion Shiba Inu tokens have moved away from exchanges, signaling a potential accumulation...

Strategy Buys $1.28B in Bitcoin, Its Largest Buy in a Month

Strategy executed its largest Bitcoin purchase in over a month, spending $1.28 billion to...

Dead Internet Theory Evolves Into ‘Web 4.0’ Rebrand

The "dead internet" conspiracy theory from five years ago, which posits most online content...

Bitcoin Hits 20 Million Mined, Only 1 Million Left for Next Century

The Bitcoin network has produced its 20 millionth coin, leaving only 1 million left...

Must Read

Top 10 Best DeFi Tokens to Invest in 2022

Decentralized Finance (Defi), is one of the most talked-about topics in the crypto space alongside NFTs. So if you want to know the best...