🚀 لقد رفعت CloudSek جولة B1 من السلسلة B1 بقيمة 19 مليون دولار - تعزيز مستقبل الأمن السيبراني التنبؤي

تم تسريب 15 ألفًا من تكوينات جدار الحماية Fortigate بواسطة مجموعة Belsen: تم التخلص منها باستخدام Zero-Day في عام 2022

اكتشف كيف استغلت Belsen Group ثغرة أمنية في يوم الصفر في عام 2022 لتسريب أكثر من 15000 تكوين لجدار حماية Fortigate، وكشف بيانات الاعتماد الحساسة وقواعد جدار الحماية وشهادات الإدارة. يسلط هذا الحادث الإلكتروني عالي التأثير، المفصل في تحليلنا، الضوء على مخاطر تجاوز نقاط الضعف في المصادقة ويقدم استراتيجيات تخفيف مهمة، بما في ذلك تحديثات بيانات الاعتماد وتدقيق جدار الحماية وتدوير الشهادات. ابق على اطلاع وقم بتأمين شبكتك ضد التهديدات المتطورة من خلال رؤى قابلة للتنفيذ من هذا التقرير الشامل.

كوشيك بالم
January 16, 2025
Green Alert
Last Update posted on
August 21, 2025
المراقبة الاستباقية للويب المظلم لمؤسستك.

يمكنك مراقبة مؤسستك والدفاع عنها بشكل استباقي ضد التهديدات من الويب المظلم باستخدام CloudSek xviGil.

Schedule a Demo
Table of Contents
Author(s)
Coauthors image
بافان كارثيك م

هل أنت متأثر؟

يرجى التحقق من تعرضك من قائمة عناوين IP: https://pastebin.com/mffLfcLp

Analysis and Attribution

Background

Vulnerabilities in Fortigate devices are often used to obtain initial access to target organizations, often due to the nature of the device and an insecure codebase. Of late, their customers have been warned of a new zeroday in the wild, CVE-2024-55591- an authentication bypass using an alternate path or channel vulnerability. However, the relationship between threat actors and the fortigate zero-days goes way back.

In 2022, Fortigate had informed their customers about exploitation in the wild for CVE-2022-40684 -  another authentication bypass vulnerability that can be exploited using an alternate path or channel.2 days ago, someone leaked over 15k Fortigate firewall configurations on an english speaking hacking forum. 


Information from the Post

  • On 14 JANUARY 2025, CloudSEK’s contextual AI digital risk platform XVigil  discovered a threat actor with the moniker “Belsen_Group” leaking configs obtained from over 15,000 Fortigate firewalls. 


Threat actor leaking configs from over 15k Fortigate firewalls on their onion website for free


  • IR engagements by researchers revealed that the threat actor most likely milked the exploit for CVE-2022-40684 by mass exploitation in 2022. Once they exhausted its use for themselves(either by selling or using the access), the threat actor(s) decided to leak it in 2025. 

  • This list was compiled in October 2022, likely when there wasn’t any CVE assigned to it.


  • The majority of the devices are 2 versions, from Fortigate 7.x devices and 7.2.x devices.

  • The leaked information includes

    • Usernames

    • Passwords (some in plain text)

    • Device management digital certificates

    • All firewall rules

  • Based on the available information, it can be ascertained with medium confidence that the threat actor used a zeroday exploit on Fortigate firewalls in 2022, followed by access brokering/mass exploitation, and subsequently leaking the data in 2025.


Note: CloudSEK has updated this blog with a link to the list of firewall IPs that were compromised. Organizations are recommended to check the blog for the list and ensure they have taken necessary response and mitigation steps.



Threat Actor Activity and Rating

Threat Actor Profiling

Active since

Jan 2025

Reputation

0

Current Status

ACTIVE

History

Belsen Group may seem new to the forums, but based on the data leaked by them, we can ascertain with high confidence that they’ve been around for at least 3 years now. They were likely part of a threat group that exploited a zero day in 2022, although direct affiliations have not been established yet.

Rating 

High


Are You Impacted?

Please check your exposure from the list of IPs: https://pastebin.com/mffLfcLp

Geographical Breakdown of the compromised Fortigate firewalls

  • US, UK, Poland and Belgium lead the charts with over 20 victims in each country.

  • France, Spain, Malaysia, Netherlands,Thailand and Saudi Arabia follow the trail, with over 10 victims in each country.


Note: This visualization includes data from companies with multiple office locations. This data is collected by parsing the domains from the emails part of the credentials leaked by the threat actor. We have not used IP addresses of the firewalls for showcasing geographical distribution.


Impact

  • Compromised Credentials: Exposure of usernames and passwords (some in plaintext) enables attackers to directly access sensitive systems. Even if organizations patched this CVE in 2022 after the patch was released by Fortigate, they still need to check for signs of compromise, as this was a zeroday.

  • Firewall Rules Publicized: Leaking firewall configurations reveals internal network structures, potentially enabling attackers to bypass defenses.

  • Device Management Certificates: Breached digital certificates could allow unauthorized device access or impersonation in secure communications.

  • Prolonged Exploitation Risk: Organizations patched after the initial 2022 disclosure may still face risks due to pre-existing compromise during the vulnerability's active exploitation.


Mitigation

  • Change Credentials Immediately: Update all device and VPN credentials, prioritizing those listed in the dump. Use strong, unique passwords.

  • Audit and Reconfigure Firewalls: Review firewall rules for vulnerabilities introduced by public exposure and tighten access controls.

  • Rotate Certificates: Revoke and replace all exposed digital certificates to restore secure communications.

  • Incident Response and Forensics: Determine the exact patching timeline for CVE-2022–40684, conduct forensic analysis of potentially affected devices, and monitor for unusual activity.



References

Predict Cyber threats against your organization

Related Posts
No items found.

انضم إلى أكثر من 10,000 مشترك

تابع آخر الأخبار حول سلالات البرامج الضارة، وأساليب التصيد الاحتيالي،
مؤشرات التسوية وتسريب البيانات.

Take action now

Secure your organisation with our Award winning Products

CloudSEK Platform is a no-code platform that powers our products with predictive threat analytic capabilities.

استخبارات الخصم
Table of Content

هل أنت متأثر؟

يرجى التحقق من تعرضك من قائمة عناوين IP: https://pastebin.com/mffLfcLp

Analysis and Attribution

Background

Vulnerabilities in Fortigate devices are often used to obtain initial access to target organizations, often due to the nature of the device and an insecure codebase. Of late, their customers have been warned of a new zeroday in the wild, CVE-2024-55591- an authentication bypass using an alternate path or channel vulnerability. However, the relationship between threat actors and the fortigate zero-days goes way back.

In 2022, Fortigate had informed their customers about exploitation in the wild for CVE-2022-40684 -  another authentication bypass vulnerability that can be exploited using an alternate path or channel.2 days ago, someone leaked over 15k Fortigate firewall configurations on an english speaking hacking forum. 


Information from the Post

  • On 14 JANUARY 2025, CloudSEK’s contextual AI digital risk platform XVigil  discovered a threat actor with the moniker “Belsen_Group” leaking configs obtained from over 15,000 Fortigate firewalls. 


Threat actor leaking configs from over 15k Fortigate firewalls on their onion website for free


  • IR engagements by researchers revealed that the threat actor most likely milked the exploit for CVE-2022-40684 by mass exploitation in 2022. Once they exhausted its use for themselves(either by selling or using the access), the threat actor(s) decided to leak it in 2025. 

  • This list was compiled in October 2022, likely when there wasn’t any CVE assigned to it.


  • The majority of the devices are 2 versions, from Fortigate 7.x devices and 7.2.x devices.

  • The leaked information includes

    • Usernames

    • Passwords (some in plain text)

    • Device management digital certificates

    • All firewall rules

  • Based on the available information, it can be ascertained with medium confidence that the threat actor used a zeroday exploit on Fortigate firewalls in 2022, followed by access brokering/mass exploitation, and subsequently leaking the data in 2025.


Note: CloudSEK has updated this blog with a link to the list of firewall IPs that were compromised. Organizations are recommended to check the blog for the list and ensure they have taken necessary response and mitigation steps.



Threat Actor Activity and Rating

Threat Actor Profiling

Active since

Jan 2025

Reputation

0

Current Status

ACTIVE

History

Belsen Group may seem new to the forums, but based on the data leaked by them, we can ascertain with high confidence that they’ve been around for at least 3 years now. They were likely part of a threat group that exploited a zero day in 2022, although direct affiliations have not been established yet.

Rating 

High


Are You Impacted?

Please check your exposure from the list of IPs: https://pastebin.com/mffLfcLp

Geographical Breakdown of the compromised Fortigate firewalls

  • US, UK, Poland and Belgium lead the charts with over 20 victims in each country.

  • France, Spain, Malaysia, Netherlands,Thailand and Saudi Arabia follow the trail, with over 10 victims in each country.


Note: This visualization includes data from companies with multiple office locations. This data is collected by parsing the domains from the emails part of the credentials leaked by the threat actor. We have not used IP addresses of the firewalls for showcasing geographical distribution.


Impact

  • Compromised Credentials: Exposure of usernames and passwords (some in plaintext) enables attackers to directly access sensitive systems. Even if organizations patched this CVE in 2022 after the patch was released by Fortigate, they still need to check for signs of compromise, as this was a zeroday.

  • Firewall Rules Publicized: Leaking firewall configurations reveals internal network structures, potentially enabling attackers to bypass defenses.

  • Device Management Certificates: Breached digital certificates could allow unauthorized device access or impersonation in secure communications.

  • Prolonged Exploitation Risk: Organizations patched after the initial 2022 disclosure may still face risks due to pre-existing compromise during the vulnerability's active exploitation.


Mitigation

  • Change Credentials Immediately: Update all device and VPN credentials, prioritizing those listed in the dump. Use strong, unique passwords.

  • Audit and Reconfigure Firewalls: Review firewall rules for vulnerabilities introduced by public exposure and tighten access controls.

  • Rotate Certificates: Revoke and replace all exposed digital certificates to restore secure communications.

  • Incident Response and Forensics: Determine the exact patching timeline for CVE-2022–40684, conduct forensic analysis of potentially affected devices, and monitor for unusual activity.



References

كوشيك بالم

Related Blogs