cyberplace.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Cybersecurity, fandom, video games, technology, dog photos and most importantly, you.

Server stats:

947
active users

A new group, Belsen Group, claim to have released Fortigate configs for 15k firewalls.

The ZIP contains a folder for each IP address, inside is config.conf (Fortigate full config dump) and vpn-passwords.txt.

The Fortigate config data appears legit - they're unique - and it looks like a very serious cyber incident is going to play out. Some align to Shodan.

All the configs appear to come from Fortigate 7.x devices, so this is probably the latest zero day Fortinet didn't tell people about (edit: update in thread, some are 7.2.x devices).

In terms of validity, you can directly match up devices between the IPs and config.

The VPN usernames and passwords are in plain text. There's also the device certs etc.

A small number of the devices are on Fortigate 7.2, versions from late 2022 - which tends to blow the recent CVE out of the water as that's not supposed to be impacted.

I've confirmed one of the usernames and passwords with one of the victims a friend works at. Impacted orgs are going to need to change local SSL VPN passwords, admin passwords etc.

If anybody wonders if it's related to this prior Fortigate SSL VPN dump: bleepingcomputer.com/news/secu

I don't think so. The configs run to a year later version wise, and the IP addresses in that dump don't align with this dump.

BleepingComputer · Hackers leak passwords for 500,000 Fortinet VPN accounts
More from Lawrence Abrams

The other thing to mention is the prior dump was via CVE-2018-13379. These devices, based on the config dumps, are largely running versions which were long ago patched for that.

So what = later vuln.

Kevin Beaumont

Off to bed now, plan for later on tomorrow is to publish the impacted IPs so orgs have a chance to know if they're in scope.

The last time somebody did this, it was a ransomware group as basically a freebie to attract operators.

Regarding 'the data's old':

a) the version numbers run up to 2 years ago, that's not very old

b) many of the devices are still online and reachable

c) there's data in the dump which has not been published before as far as I can see, along with device configs

One final update - did some IR on an impacted device, it looks like CVE-2022-40684 based on artefacts left behind.

It also looks like the data was assembled in October 2022 and only just released, looking back at historic IP records vs the dump. So basically if your config might be in the dump even if you patched, as it was a zero day at the time.

Also in the dump is complete firewall rules for the devices.

Also, Belsen was a exchange camp, where Jewish hostages were held with the intention of exchanging them for German prisoners of war held overseas.

Here's how the data was organised, by country (Australia and UAE love Forti).

The data appears to have been assembled for release starting on the 11th, based on the modified dates (but was collected years earlier).

Plan for later today is release an Excel file with IPs, reverse DNS, ASN org names and numbers, country etc so orgs can better surface their exposure. Will post here and update blog post.

Also, in terms of data validity - I have an automated process scraping HTTP requests for serial numbers and comparing to serial numbers in config files for same IPs: it's legit, they match.

Updated my blog on the Fortigate situation (at the bottom). Nothing particularly interesting.

Also, the blog has pretty significant traffic, just looked at the numbers - but less than 4% from Twitter. That would have been unthinkable a few years ago.

doublepulsar.com/2022-zero-day

DoublePulsar · 2022 zero day was used to raid Fortigate firewall configs. Somebody just released them.By Kevin Beaumont

FortiGate have a blog out: fortinet.com/blog/psirt-blogs/

It’s essentially the same as my blog - but in corporate 🤣

It plays heavily on the ‘this is old data’ angle and says you’ll be fine as long as you rotated credentials. Sure, somebody obtained all your firewall rules.. but that’s okay.. right. ✅

Fortinet Blog · Analysis of Threat Actor Data Posting | Fortinet BlogThis blog analysis regarding a recent threat actor posting, which claims to offer compromised configuration and VPN credentials from FortiGate devices, provides factual information to help our cust…

To help defenders find their impacted orgs in the Fortigate configuration dump incident, here's all emails mentioned - Ctrl+F for yourself.

Obvious point - not everybody puts their email address in a config file.

raw.githubusercontent.com/Goss

Also, one of the things I've seen mentioned about this dump (including by Fortigate, bizarrely) is 'old IPs, none of these are live'.

Tip: remotegw-ddns feature. Fortinet even offer dynamic DNS as a service so the IPs float by design. A lot of them are hanging off that.

One other side effect of the FortiGate config incident is there’s several thousand site to site IPsec VPN configs allowing you to straight up join to the internal network of large orgs.

So even if you weren’t popped, the threat actor can pop up on your network.

If anybody is wondering:

$ cat */*/* | grep -c "ike-version"
11917

11.9k IPsec VPN tunnels (some orgs have lots).

Belsen Group are back and can spell their own group name now.

This is what they're trying to sell, they're also trying to sell the original dump for some reason.

They don't appear to have a way to actually sell the data as the links don't point anywhere, which is a slight flaw.

@GossiTheDog Gotta feel a little sorry for the poor bud who's gonna have one hell of a rude awakening tomorrow when he see's a bunch of devices he recognizes as the ones he thought they'd already patched... 2025 is going to be one bumpy ride.

@brentdev @GossiTheDog

They need to get their management interface off the Internet or they'll be back here again and again.

@GossiTheDog

Thanks for all of this, as ever. Wondering if anyone pulled all of this down and re-uploaded the full dataset anywhere as the original appears to be down?

@GossiTheDog any devices belonging to Maldives?

@GossiTheDog I read half a VPN password aloud to a victim on the phone, they completed the other half. They're *definitely* legit. They also seem to be mostly cleartext, even those not looking like cleartext?

@GossiTheDog appreciate getting the IP dump link in thete, was able to highlight it to one affected org I have contacts with.

@GossiTheDog oh that’s ok, everyone’s got approximately the same firewall rules anyway

@GossiTheDog also running FortiOS 7.6 or 7.4 in 2022 wasn't really a good idea for the stability of your network.

@GossiTheDog
> If your organization has consistently adhered to routine best practices in regularly refreshing security credentials and taken the recommended actions in the preceding years, the risk of the organization’s current config or credential detail in the threat actor’s disclosure is small.

So, basically: please rotate all your firewall credentials daily considering that 0days are released basically every day on our products at the moment.
That's top advice 💯

@GossiTheDog Phew, our company is not there. Thank fuck for that.

@GossiTheDog none of these are live? How fast does forti think their hardware gets rotated out, exactly?

@GossiTheDog I would imagine plenty of folks use DDNS because it's easier and cheaper than a dedicated IP, especially for services where you're not really concerned with having a "pretty" vanity domain name.

@GossiTheDog yet another win for denying client and vendor IPsec tunnels everyone forgets exists

@GossiTheDog and fortigate has some interesting bugs and quirks with how they handle ike/ipsec traffic. The firewall local-in handler, for example, does zilch for esp packets.

@GossiTheDog I see Belsen Group is now ... charging for the leak? I suppose to capitalize on demand. :/

I know some copies are floating around from before the $100 price was added - I have a copy and have a mirror/torrent ready. Before yeeting it into the world I did want to quickly check: I haven't looked at the details of this in the same depth you have, so if it's best to limit copies floating around right now I'm happy to hold off on publishing my mirror.

Edit: I ain't the first, so yeet

@GossiTheDog there is a malware in his github (AKboss1221 Fortigate Belsen Leak} be careful from {Lua.exe}

@GossiTheDog It would be nice if Fortinet supported more general 2FA solutions vs. their paid fortitoken system.

@GossiTheDog
To just see the list of domains, try this abuse of commands:

wget -qO- 'https://github.com/GossiTheDog/Monitoring/raw/refs/heads/main/Fortigate-Config-Dump-emails.txt' | grep 'set email-to' | cut -d ' ' -f 11 | cut -d '@' -f 2 | cut -d '"' -f 1 | sort -fu

(Hopefully that formatted well.)

@GossiTheDog what's the HTTP call to get a fortinet to return it's serial number? I thought that required authentication

@GossiTheDog this is yeoman's work; thanks for putting in the effort

@GossiTheDog I just downloaded the list of IPs and was planning on running my geolocation script on them but need to remove the port first (or to update my script to ignore it).

@GossiTheDog Thanks for sharing this.
We just checked for our IP ranges (nothing in there) but one of my colleagues grouped the IPs in the repo by AS - funnily enough, a good number of the top few are AS from which we frequently see DDOS traffic against our services. Perhaps suggests a lack of care & maintenance on their part & that the DDOS are likely from/via compromised kit. Not a major surprise.

@tdp_org @GossiTheDog I find the absence of, e.g., 3320 in that list a bit odd.

@GossiTheDog A quick look suggests there's a lot of dynamic IPs in there. few static entries as well.

However an org might still recognise its host ISP as a way of identifying itself.

sed -i 's/\(^[0-9.]*\)\(:.*$\)/-x \1 +noall +answer +authority/' affected_ips.txt

then
dig -f affected_ips.txt >> forti-domains.txt
then just grep for your ISP.

Although if you _think_ youre on the list, maybe just roll creds anyway

@GossiTheDog Thanks for the github list. Company network blocks Tor ;)

@GossiTheDog can you share a zip file out of onion?

@emme @GossiTheDog
that would be great - am also running a few forti boxes in austria and the provider ip might have changed so it would be hard to verify only on this information

@GossiTheDog

They apparently took down the TOR site a few hours ago. I was trying to download so we could do notifications to entities affected in our AOR.