Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Chinese Hackers Compromise Thousands of FortiGate Systems
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Chinese Hackers Compromise Thousands of FortiGate Systems

Highlights

  • Chinese threat actors expanded their capabilities in a cyber espionage campaign.

  • Over 20,000 FortiGate systems were compromised globally.

  • Persistent access poses continued risks despite mitigation efforts.

Ethan Moreno
Last updated: 12 June, 2024 - 9:45 am 9:45 am
Ethan Moreno 11 months ago
Share
SHARE

Chinese threat actors have launched a significant cyber espionage campaign targeting FortiGate systems worldwide. Recent findings indicate that these actors exploited vulnerabilities in edge devices, significantly expanding their capabilities beyond initial assessments. The Military Intelligence and Security Service (MIVD) and the General Intelligence and Security Service (AIVD) have issued advisories, highlighting the extent of the campaign and the sophisticated methods used.

Contents
Mitigation MeasuresSignificant Inferences

FortiGate is a security platform launched by Fortinet, designed to provide advanced threat protection and secure network services. It includes features such as firewall, VPN, antivirus, and web filtering. FortiGate was introduced in 2002, and it has since been widely adopted across various industries for its comprehensive security capabilities.

Previous reports revealed that Chinese cyber actors utilized COATHANGER malware to infiltrate FortiGate systems. However, new insights show that the campaign had a broader reach, affecting over 20,000 systems globally. These systems include those of governments, international organizations, and numerous companies in the defense sector. Such widespread infiltration indicates a sophisticated and sustained effort by the threat actors.

Further investigations disclose that the initial access to these systems was achieved through the CVE-2022-42475 vulnerability. The threat actor exploited this flaw months before it was publicly disclosed, allowing them to infect over 14,000 devices during this period. Despite attempts to mitigate the damage, including security updates, the actors still maintain access to many compromised systems. This persistent access points to the advanced knowledge and capabilities of the threat actors involved.

Mitigation Measures

In response to this extensive breach, the NCSC recommends organizations adopt the “assume breach” principle, which presupposes an existing breach has occurred. Additional measures such as network segmentation, enhanced detection systems, incident response plans, and forensic readiness are suggested to limit further damage. These steps are crucial for organizations to protect themselves from future attacks and mitigate the impact of current breaches.

Significant Inferences

  • Chinese cyber actors have extensive capabilities and access to critical systems globally.
  • Exploited vulnerabilities can remain undetected for months, allowing significant infiltration.
  • Persistent access by threat actors poses long-term security risks even after mitigation efforts.

The extensive reach of the Chinese cyber espionage campaign underscores the need for robust security measures. Organizations must adopt proactive and comprehensive strategies to defend against such sophisticated threats. Regular security audits, timely updates, and ongoing monitoring are essential to safeguard critical systems. Additionally, international collaboration and information sharing can enhance the collective defense against state-sponsored cyber threats.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Microsoft Tackles 72 Vulnerabilities in May Security Update

Apple Boosts Security With Extensive Software Updates

US Authorities Dismantle Botnets and Indict Foreign Nationals

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Microsoft Outlook Zero-Click Vulnerability Threatens Systems
Next Article Malicious Node Targets ComfyUI Users

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Capcom Reports Record Profits with Monster Hunter Leading Sales
Gaming
Elon Musk Expands Starlink in Saudi Arabia for Maritime and Aviation
Electric Vehicle Technology
Tesla’s FSD Reacts Swiftly to Avoid Semi-Truck Collision
Electric Vehicle
Tesla Brings Robotaxi to Saudi Arabia as Global Expansion Continues
Electric Vehicle
Tesla Constructs Cortex 2.0 at Giga Texas to Boost Computing Power
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?