News

Amazon AI Cyberattack Hits 600 FortiGate Devices

AI-Powered Hackers Breach 600 FortiGate Firewalls Worldwide

Written By : Anudeep Mahavadi
Reviewed By : Atchutanna Subodh

The investigation into the Amazon AI Cyberattack showed that attackers obtained control over more than 600 devices, which extended across 55 countries. According to the latest Amazon Threat Intelligence Report, the campaign ran from January 11 to February 18. 

The attackers did not exploit advanced vulnerabilities. Instead, they targeted exposed management ports and weak, single-factor authentication settings.

 AI in Cybercrime as a Force Multiplier

The report shows how AI in cybercrime is reshaping threat operations. Commercially available AI tools were used to generate attack scripts, automate reconnaissance, and plan lateral movement inside networks. CJ Moses, Amazon CISO, stated that no FortiGate software vulnerabilities were exploited. Rather, “fundamental security gaps” allowed a low-to-medium-skilled actor to scale attacks rapidly. When stronger defenses were detected, the attackers shifted to easier targets, highlighting efficiency over sophistication.

Signs of Pre-Ransomware Operations

After breaching firewalls, the attackers extracted full device configurations. This includes SSL-VPN credentials, administrative passwords, and network maps. Stolen credentials enabled deeper intrusions into internal systems, including Active Directory environments and backup infrastructure

Amazon researchers found that the observed activity matched pre-ransomware staging activities. This indicates they are intended to prepare for forthcoming extortion campaigns instead of launching immediate system disruptions.

What This Means for Cybersecurity in 2026

The campaign did not rely on known CVEs but basic misconfigurations, which showed that cybersecurity hygiene gaps continue to exist. The research results show that AI enables threat actors to access their targets more quickly while increasing their operational capabilities. 

Amazon has shared indicators of compromise with partners and urged organizations to secure edge devices, enforce multi-factor authentication, and monitor post-exploitation activity. The defensive strategies of organizations need to develop at the same rate as AI adoption in their operations.

Join our WhatsApp Channel to get the latest news, exclusives and videos on WhatsApp

DOGE, SHIB, and PEPE Price Forecast: Are Meme Coins Entering a Bear Phase?

Bitget vs Coinbase: Which Crypto Exchange is Safer in 2026?

Best Solana ETFs for 2026: Compare Fees, Staking Rewards & Promos

Custodia CEO Caitlin Long Claims Trump Crypto Ventures Complicate US Regulation Talks

Dogecoin News Today: Is DOGE Ready for a Major Breakout as $0.10 Support Holds Firm?