Brute-Force Attacks Surge Against Fortinet SSL VPN Devices Globally

Brute-Force Attacks Surge Against Fortinet SSL VPNs, Signal Potential Security Vulnerabilities

  • Researchers report a sharp rise in brute-force attacks targeting Fortinet SSL VPN devices.
  • Over 780 unique IP addresses were involved in the attacks observed on August 3, 2025.
  • Malicious traffic originated from multiple countries and targeted systems worldwide.
  • Attack patterns shifted after August 5 to also focus on FortiManager services.
  • Activity often predicts the discovery of security flaws in affected technologies within weeks.

Cybersecurity researchers have detected a significant increase in brute-force attempts against Fortinet SSL VPN systems. Threat intelligence firm GreyNoise observed this coordinated campaign on August 3, 2025, identifying participation from more than 780 unique IP addresses.

- Advertisement -

In the 24 hours before the report, 56 unique IP addresses engaged in these attacks. GreyNoise classified all of them as malicious. The origins of this traffic included the United States, Canada, Russia, and the Netherlands. Attackers aimed at targets located in the United States, Hong Kong, Brazil, Spain, and Japan.

According to GreyNoise, the attackers specifically targeted Fortinet SSL VPNs, not using random or opportunistic methods. “Critically, the observed traffic was also targeting our FortiOS profile, suggesting deliberate and precise targeting of Fortinet’s SSL VPNs,” the company said. Researchers detected two main waves: an ongoing long-term attack connected to a single network signature, and a more concentrated short-term burst with a separate signature.

After August 5, the firm saw a change in attack focus. “While the August 3 traffic has targeted the FortiOS profile, traffic fingerprinted with TCP and client signatures—a meta signature—from August 5 onward was not hitting FortiOS,” GreyNoise explained. Instead, this latter wave targeted FortiManager services. This shift signaled to researchers that attackers may be reusing the same tools or infrastructure to go after different Fortinet systems.

Further investigation found that similar attack fingerprints were first noticed in June, possibly indicating the initial use or testing of brute-force tools on a home network or via a residential proxy.

- Advertisement -

GreyNoise highlighted that spikes in attacks like these often come before the public disclosure of a new vulnerability in the targeted technology, usually within six weeks. These patterns commonly impact enterprise systems such as VPNs and firewalls, which are frequent targets for sophisticated threat groups.

The Hacker News has contacted Fortinet for comment and will provide updates if a response is received.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Poland’s President Again Vetoes Crypto Bill

Poland's president has vetoed a second bill designed to implement the EU's Markets in...

Deutsche Bank: $11B Tax Refunds May Boost US Stocks

Deutsche Bank estimates $11 billion from US tax refunds may flow into the stock...

Ireland probes X’s Grok AI over child sexual deepfakes

Ireland’s top privacy regulator, the Data Protection Commission (DPC), has launched a major GDPR...

Bitcoin ETFs Hit Four-Week Outflow Streak Losing $3.4B

Spot Bitcoin ETFs have seen four consecutive weeks of net outflows, totaling over $3.4...

SBI Holdings Moves to Control Singapore’s Coinhako

SBI Holdings, a major Japanese financial firm, plans to acquire a controlling majority stake...

Must Read

9 Best Books On Ethereum And Blockchain Technology

QUICK LINKSHow to Choose Your First Blockchain Book: A Simple Framework1. Define Your Goal: Are you looking to Build, Invest, or Understand?2. Assess Your...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!