Sunday, February 9, 2025
HomeCVE/vulnerabilityHackers Exploited Fortinet Vulnerabilities to Gain Access of a U.S. Municipal Government...

Hackers Exploited Fortinet Vulnerabilities to Gain Access of a U.S. Municipal Government Webserver

Published on

SIEM as a Service

Follow Us on Google News

Recently, APT group or the state-sponsored hackers have exploited the vulnerabilities in an unpatched Fortinet VPN to compromise the webserver of a U.S. municipal government web server, as reported by the FBI (Federal Bureau of Investigation).

The APT (Advanced Persistent Threat) hackers created new servers, domain controllers, and workstation user accounts just after gaining access to the webserver of the local government organization.

While after revealing the matter, the FBI asserted that, “The FBI is continuing to warn about Advanced Persistent Threat (APT) actors exploiting Fortinet vulnerabilities. As of at least May 2021, an APT actor group almost certainly exploited a Fortigate appliance to access a webserver hosting the domain for a U.S. municipal government.”

According to the FBI, the APT hackers are building ‘WADGUtilityAccount’ and ‘elie’ accounts on the hacked systems of the local government body, to use them to accumulate and exfiltrate data from the compromised network of the victims.

FBI and CISA already warned

Earlier, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have already warned in April about the attacks that are executed by the APT hackers by exploiting multiple exploits in Fortinet FortiOS servers.

The vulnerabilities that are actively exploited by the APT group are mentioned below:-

  • CVE-2018-13379
  • CVE-2019-5591
  • CVE-2020-12812

Apart from this, the experts have explained that APT hackers may use the compromised servers to target critical infrastructure sectors for the execution of future attacks.

Tools used

The APT group has used the following tools to execute these attacks:-

  • Mimikatz (credential theft)
  • MinerGate (crypto mining)
  • WinPEAS (privilege escalation)
  • SharpWMI (Windows Management Instrumentation)
  • BitLocker activation when not anticipated (data encryption)
  • WinRAR where not expected (archiving)
  • FileZilla where not expected (file transfer)

APT actors mostly targeted the Fortinet appliances

According to the reports, over the years the unpatched Fortinet servers were mostly targeted by state-sponsored hackers or APT hackers. 

Here, to negotiate the vulnerable U.S. election support systems the threat actors have mostly and continuously exploited the Fortinet SSL VPN vulnerability (CVE-2018-13379).

Even in November 2020 hackers abused the CVE-2018-13379 to exfiltrate the VPN credentials of more than 50,000 Fortinet VPN servers that include critical infrastructures like governments and banks.

Recommendations

Moreover, to block these compromise attempts that are executed by the APT hackers, the FBI and CISA have shared some mitigations, and here they are mentioned below:-

  • Immediately patch the CVEs 2018-13379, 2020-12812, and 2019-5591.
  • Inspect all the domain controllers, servers, workstations, and active directories.
  • Re-check the Task Scheduler for unrecognized scheduled tasks.
  • Regularly revise the antivirus logs.
  • Regularly back up data.
  • Implement network segmentation.
  • Install latest updates and patches.
  • Use multifactor authentication.
  • Avoid reusing old passwords, and try to change passwords regularly.
  • Disable unused remote access/Remote Desktop Protocol (RDP) ports.
  • Audit user accounts with administrative privileges
  • Install and regularly update antivirus tools.
  • Always use a virtual private network (VPN).
  • Disable hyperlinks in received emails.

To gain access to critical infrastructure networks the APT hackers have used several common attack vectors like spearphishing.

So, to avoid such attacks and refine the compromised systems and networks the FBI and the CISA have strongly recommended the victims to follow the above-mentioned mitigation measures offered by them.

Also Read: Hackers Exploit FortiOS Vulnerabilities to Access Government and Technology Services Networks

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat...

7-Zip 0-Day Flaw Added to CISA’s List of Actively Exploited Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical 0-day vulnerability...

Logsign Vulnerability Allows Remote Attackers to Bypass Authentication

A critical security vulnerability has been identified and disclosed in the Logsign Unified SecOps...