ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Fortinet SSL VPN Targeted by Hackers from 780 Unique IP Addresses

Threat Score:
51
GB Hackers
4 days ago
Part of cluster #1877

Overview

Fortinet SSL VPN Targeted by Hackers from 780 Unique IP Addresses Cybersecurity researchers at GreyNoise have detected an alarming surge in brute-force attacks against Fortinet SSL VPN systems, with over 780 unique IP addresses launching coordinated attacks in a single day—marking the highest daily volume recorded for this type of attack in recent months. The sophisticated campaign appears to represent a significant escalation in targeting Fortinet’s enterprise networking infrastructure, with at...

Continue Reading on Original Site

Related Articles

5 articles
1

ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure

The Hacker News • 4 hours ago

Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC 3.0, uncovering serious shortcomings in the operators' infrastructure. "The newly uncovered version 3.0 reveals a significant evolution of the malware, expanding its form injection and data theft capabilities to target more than 700 banking, shopping, and cryptocurrency applications," Hunt.iosaidin a report. ERMAC wasfirst documentedby ThreatFabric in September 2021, detailing its ability to cond

Score
86
Read more
2
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 23 minutes ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
3

ERMAC v3.0 Banking Malware Source Code Exposed via Weak Password ‘changemeplease’

Cybersecurity News • 1 hour ago

Researchers at Hunt.io have made a significant discovery in the cybersecurity field by obtaining and analyzing the complete source code of ERMAC V3.0. This advanced Android banking trojan targets over 700 financial applications worldwide. This unique insight into an active malware-as-a-service platform offers a valuable understanding of modern cybercriminal operations and highlights critical vulnerabilities that could assist […]

Score
78
Read more
4

Threat Actors Abuse npm Developer Accounts Hijacked to Spread Malicious Packages

GB Hackers • 4 hours ago

Threat Actors Abuse npm Developer Accounts Hijacked to Spread Malicious Packages A sophisticated phishing campaign targeting the maintainer of eslint-config-prettier, a widely-used npm package with over 3.5 billion downloads, resulted in malicious code being distributed to thousands of developer projects worldwide. The incident, discovered on July 18 by ReversingLabs’ automatedthreat detectionsystem, highlights critical vulnerabilities in modern software development practices, particularly the r

Score
77
Read more
5

New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials

Cybersecurity News • 53 minutes ago

A sophisticated new phishing campaign targeting Gmail users through a multi-layered attack that uses legitimate Microsoft Dynamics infrastructure to bypass security measures and steal login credentials. The attack begins with deceptive “New Voice Notification” emails that appear to come from legitimate voicemail services. These emails contain spoofed sender information and feature prominent “Listen to Voicemail” […]

Score
76
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2025-5777
CVE-2025-6543
ATTACK TYPES
Brute Force
Brute-Force Attack
Credential Stuffing
Exploit Public-Facing Application
Exploitation of VPN
INDUSTRIES
Cybersecurity
Education
IT Security
Information Technology
Telecommunications
COUNTRIES
Brazil
Canada
Hong Kong
Japan
Netherlands
VULNERABILITIES
Authentication Bypass
Command Injection
DDoS
DoS
Exploitation
COMPANIES
AMD
Adobe
Amazon
Apple
Cisco
SECURITY VENDORS
Cloudflare
Fortinet
GreyNoise
PLATFORMS
AWS
Android
Apache
Azure
Citrix
APT GROUPS
ShinyHunters
RANSOMWARE
AnDROid
Evolution
First
One
Unknown
MITRE ATT&CK
Phishing
Proxy
T1040
T1046
T1059
MALWARE
Dark
IP ADDRESSES
780 unique IP addresses
IP ADDRESSES
780 unique IP addresses
ARTICLE INFORMATION
Article #10905
Published 4 days ago
GB Hackers

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration