Saturday, April 13, 2024

Hackers Exploited Fortinet Vulnerabilities to Gain Access of a U.S. Municipal Government Webserver

Recently, APT group or the state-sponsored hackers have exploited the vulnerabilities in an unpatched Fortinet VPN to compromise the webserver of a U.S. municipal government web server, as reported by the FBI (Federal Bureau of Investigation).

The APT (Advanced Persistent Threat) hackers created new servers, domain controllers, and workstation user accounts just after gaining access to the webserver of the local government organization.

While after revealing the matter, the FBI asserted that, “The FBI is continuing to warn about Advanced Persistent Threat (APT) actors exploiting Fortinet vulnerabilities. As of at least May 2021, an APT actor group almost certainly exploited a Fortigate appliance to access a webserver hosting the domain for a U.S. municipal government.”

According to the FBI, the APT hackers are building ‘WADGUtilityAccount’ and ‘elie’ accounts on the hacked systems of the local government body, to use them to accumulate and exfiltrate data from the compromised network of the victims.

FBI and CISA already warned

Earlier, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have already warned in April about the attacks that are executed by the APT hackers by exploiting multiple exploits in Fortinet FortiOS servers.

The vulnerabilities that are actively exploited by the APT group are mentioned below:-

  • CVE-2018-13379
  • CVE-2019-5591
  • CVE-2020-12812

Apart from this, the experts have explained that APT hackers may use the compromised servers to target critical infrastructure sectors for the execution of future attacks.

Tools used

The APT group has used the following tools to execute these attacks:-

  • Mimikatz (credential theft)
  • MinerGate (crypto mining)
  • WinPEAS (privilege escalation)
  • SharpWMI (Windows Management Instrumentation)
  • BitLocker activation when not anticipated (data encryption)
  • WinRAR where not expected (archiving)
  • FileZilla where not expected (file transfer)

APT actors mostly targeted the Fortinet appliances

According to the reports, over the years the unpatched Fortinet servers were mostly targeted by state-sponsored hackers or APT hackers. 

Here, to negotiate the vulnerable U.S. election support systems the threat actors have mostly and continuously exploited the Fortinet SSL VPN vulnerability (CVE-2018-13379).

Even in November 2020 hackers abused the CVE-2018-13379 to exfiltrate the VPN credentials of more than 50,000 Fortinet VPN servers that include critical infrastructures like governments and banks.


Moreover, to block these compromise attempts that are executed by the APT hackers, the FBI and CISA have shared some mitigations, and here they are mentioned below:-

  • Immediately patch the CVEs 2018-13379, 2020-12812, and 2019-5591.
  • Inspect all the domain controllers, servers, workstations, and active directories.
  • Re-check the Task Scheduler for unrecognized scheduled tasks.
  • Regularly revise the antivirus logs.
  • Regularly back up data.
  • Implement network segmentation.
  • Install latest updates and patches.
  • Use multifactor authentication.
  • Avoid reusing old passwords, and try to change passwords regularly.
  • Disable unused remote access/Remote Desktop Protocol (RDP) ports.
  • Audit user accounts with administrative privileges
  • Install and regularly update antivirus tools.
  • Always use a virtual private network (VPN).
  • Disable hyperlinks in received emails.

To gain access to critical infrastructure networks the APT hackers have used several common attack vectors like spearphishing.

So, to avoid such attacks and refine the compromised systems and networks the FBI and the CISA have strongly recommended the victims to follow the above-mentioned mitigation measures offered by them.

Also Read: Hackers Exploit FortiOS Vulnerabilities to Access Government and Technology Services Networks


Latest articles

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...

Hackers Employ Deepfake Technology To Impersonate as LastPass CEO

A LastPass employee recently became the target of an attempted fraud involving sophisticated audio...

Sisence Data Breach, CISA Urges To Reset Login Credentials

In response to a recent data breach at Sisense, a provider of data analytics...

DuckDuckGo Launches Privacy Pro: 3-in-1 service With VPN

DuckDuckGo has launched Privacy Pro, a new subscription service that promises to enhance user...

Cyber Attack Surge by 28%:Education Sector at High Risk

In Q1 2024, Check Point Research (CPR) witnessed a notable increase in the average...

Midnight Blizzard’s Microsoft Corporate Email Hack Threatens Federal Agencies: CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive concerning a...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles