FortiGate Edge Devices Targeted in Recent Intrusions
- 5 days ago
- 2 min read

Recent research published by SentinelOne highlighted a series of intrusions targeting organizations through compromised FortiOS devices.
Edge infrastructure has become an increasingly attractive target for attackers. Firewalls, VPN gateways, and other perimeter devices often sit directly exposed to the internet while maintaining deep visibility into internal networks.
Compromise of these systems can provide attackers with a strategic foothold that extends far beyond a single endpoint.
The Problem: When Perimeter Devices Become Persistence Points
Unlike traditional endpoints, firewall appliances operate at the control plane of the network.
If attackers gain administrative access to these systems, they may be able to:
Modify firewall rules and security policies
Create unauthorized administrative accounts
Monitor or redirect network traffic
Maintain persistence at the network boundary
Because these devices manage traffic flows across the environment, changes at this level can significantly impact both security posture and visibility.
Observed Attacker Activity
In the reported intrusions, attackers focused on manipulating device configurations after gaining access.
This included activities such as:
Downloading firewall configuration files
Altering security policies
Establishing administrative access for persistence
These actions highlight the importance of monitoring not just authentication events, but high-impact configuration changes on perimeter devices.
Detection and Visibility at the Edge
Detecting this type of activity is challenging because it often occurs at the network edge, where traditional endpoint visibility is limited. Monitoring configuration changes, administrative actions, and policy modifications becomes critical in identifying potential compromise.
In our case, this led to the development of a detection rule focused on identifying suspicious patterns associated with FortiGate configuration access and post-exploitation activity.
You can find the detection logic here.
Why This Matters
Compromised edge devices can enable attackers to:
Intercept or redirect network traffic
Weaken security controls
Maintain long-term access to the environment
Because these systems operate at the network boundary, their compromise can affect multiple segments of the infrastructure simultaneously.
Key Takeaway
Endpoints are no longer the only targets. Attackers increasingly focus on network control points — systems that provide visibility, control, and persistence across the entire environment.
By monitoring high-impact configuration events and understanding expected behavior, CyberSift helps organizations detect and respond to edge compromise before attackers can pivot or establish long-term access. -Written by Stanislav Stoychev, Security Analyst, CyberSift




Comments