Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › Security › Hackers exploited Fortinet CVE-2018-13379 vulnerability to extract the data

    Hackers exploited Fortinet CVE-2018-13379 vulnerability to extract the data

    By Ratnesh ShindeSeptember 10, 2021
    Facebook Twitter Reddit LinkedIn
    Hackers Fortinet

    In a significant data leak, the usernames and passwords of about 5 lakh Fortinet VPN customers were published on the internet, according to reports. It is believed that the list comprises data from about 12,856 devices from all around the world, according to the information available.

    The credentials for Fortinet have been made available for free by a threat actor going by the name of ‘Orange.’ According to a report published by BleepingComputer, Orange is the administrator of the recently created RAMP hacker forum and has previously been associated with the Babuk ransomware campaign.

    Citing a Fortinet vulnerability in a blog post that included the URL to the stolen credentials, Orange says that the credentials were scraped by a Fortinet weakness. Even though the security flaw has now been fixed, the stolen VPN credentials, which include usernames and passwords, are still being used today. You may also be interested to know How to Choose the Best VPN to Protect Your Privacy?

    Fortinet said in a statement to the media agency that the data was stolen from computers that had not been patched with the latest security patch since 2019. In response to a hostile actor disclosing SSL-VPN credentials to access FortiGate SSL-VPN devices, Fortinet has taken the following action: “The credentials were acquired from computers that had not yet installed the patch update that was released in May of this year.”

    “Since May 2019, Fortinet has consistently engaged with customers, encouraging them to adopt mitigations, including corporate blog articles in August 2019, July 2020, April 2021, and June 2021,” the company continued. The company also announced that it will be sending “another alert strongly advising that consumers perform both the patch upgrade and password reset as soon as possible.”

    For the time being, the file containing the leaked credentials is being stored on a Tor storage server. BleepingComputer has confirmed that the file contains VPN credentials for 498,908 users and that all of the IP addresses tested were Fortinet VPN servers after analyzing the file. Advanced Intel also confirms that the information has been gathered from people all around the world. Another source verified that at least part of the credentials that had been released was genuine since it was able to validate them lawfully in the process.

    Because it is such a large data set, and because it has been made available for free, it is now impossible to determine the objectives of the hackers. Although Advanced Intel CTO Vitali Kremez speculates that the disclosed data was made public to promote the RAMP hacking forum by providing a “freebie” for members, he does not believe this is the case.

    On top of his involvement with the RAMP ransomware forum, the threat actor Orange is also suspected of being a representative of the new Groove ransomware operation, which has so far only mentioned one victim on its data dumpsite. The article containing the stolen data from Fortinet was also found on the data dumpsite for the Groove ransomware. The operation may be attempting to recruit new threat actors to their system by publishing the free data.

    Because it allows hackers to get access to a network, the data breach is extremely significant because it opens the door for them to extract data, install malware, or launch ransomware attacks. Fortinet users are thus recommended to update to the most recent service patch and to execute a forced password reset for all of their accounts. Besides that, they should examine their logs for any suspected intrusions.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Ratnesh Shinde

    Related Posts

    NVIDIA GeForce NOW is Finally Coming to India

    January 8, 2025

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024
    Lists You May Like

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.