7 WAY SECURITY

7 WAY SECURITY

(+57) 3007265036
Email: [email protected]

7WAY SECURITY
Bogotá, Cra 49 # 128B - 31 - My desk - Of. 201

GET IN TOUCH WITH ONE OF OUR EXPERTS: 3007265036
  • HOME
  • ABOUT US
  • SECTORS
    • FINANCIAL
    • ENERGY
    • TELECOMMUNICATIONS
    • HEALTH
    • TRANSPORT
  • SERVICES
    • OFFENSIVE
      • Ethical Hacking
      • Red Team Testing plans
      • 7Way Ops
      • Pentesting on Demand
      • Anguilla
      • Certified Testing
    • DEFENSIVE
      • Training
    • INTELLIGENCE
      • Cattleya platform
      • Threat Hunting
    • INCIDENT RESPONSE
      • Incident Response
      • Digital Investigations
      • CSIRT 711
    • CONSULTANCY
      • Black Team
  • JOIN THE TEAM
    • Supply Network Team
    • Offer Blue Team
    • Offer Black Team
    • Offer Orange Team
    • Offer Green Team
    • Offer Practitioners
    • Offer Gray Team
    • Offer White Team
  • PRICES
  • CONTACT
  • BLOG
  • Home
  • Cybersecurity
  • Fortinet at Risk: Unpatched Vulnerabilities and Critical Data Breach
June 27, 2025

Fortinet at Risk: Unpatched Vulnerabilities and Critical Data Breach

2
Iván Garzón
Ivan Garzon
Wednesday, 29 January 2025 / Published in Cybersecurity, Threat Intelligence, Technology

Fortinet at Risk: Unpatched Vulnerabilities and Critical Data Breach

Blog_Vulnerabilidad_Fortinet_Leak_7way_security

The team Cattleya platform has identified a new threat in the cybersecurity landscape: the Belsen group has leaked critical data from over 15.000 Fortinet devices after exploiting a high-severity vulnerability (CVE-2022-40684, CVSS 9.6).

The most alarming aspect of this incident is that the attackers compromised these devices back in 2022, before the vulnerability was patched, and waited over two years before making the breach public on the Deep Web forum.

Incident Timeline

Before October 2022

The exact date when the Belsen Group discovered and began exploiting the Fortinet vulnerability remains uncertain. However, it has been confirmed that the compromise occurred before October 2022 affecting over 15,000 systems worldwide,impacting both public and private sector organizations.

October 10, 2022

Fortinet officially released a patch for vulnerability CVE-2022-40684, classified as critical with a CVSS score of 9.6.

🔗 Source: Fortiguard – FG-IR-22-377

January 14, 2025

More than two years after the initial exploitation, the Belsen Group appeared on a clandestine Deep Web forumoffering a 1.6 GB file containing confidential information extracted from the compromised Fortinet devices. The file includes:

  • Device configurations.
  • VPN credentials and other sensitive data.

Two days later, Belsen Group published an announcement on X (Twitter), and launched a Tor network site to commercialize the leaked data.

Six days after the leak, the Belsen Group announced they would charge $100 USD for downloading the file containing the compromised data.

Additionally, an analysis of the website, reveals that users are required to make a $100 payment before downloading the information..

28 January 2025, Belsen Group releases a new batch of 1,000 additional devices for sale at 500 USD.

Threat Actor Information Identified by the Cattleya Cyber Intelligence Team Cattleya platform:

Impact

As part of the capabilities of proactive monitoring and warning early on of Cattleya platformthe team accessed and analyzed the leaked data, confirming a total of 15.474 different IPs , Each compromised system had a corresponding folder containing: Device configuration files, User credentials, Digital certificates for each device. Cattleya platform clients that were potentially affected were immediately notified. However, an analysis of the configurations and credentials by country revealed significant details about the impacted devices:

  • 🇨🇴 Colombia: 372 compromised devices
  • 🇲🇽 Mexico: 1,382 compromised devices
  • 🇨🇱 Chile: 8 compromised devices
  • 🇵🇪 Peru: 104 compromised devices
  • 🇦🇷 Argentina: 245 compromised devices

These numbers highlight the severe impact of the breach across Latin America, affecting both private companies and government entities.

In an internal analysis, the Cattleya platform team conducted a reverse engineering assessment on a random configuration file to determine the extent of Belsen Group 's access and how other malicious actors might exploit this leaked data.

The leaked files expose organizations to serious risks, including:

  • Access to private configuration settings
  • Extraction of VPN credentials and authentication data
    Identification of firmware versions, hostnames, and system configurations.
  • Compromised administrator emails and access permissions.
  • Analysis of firewall rules and browsing profiles..
  • Downloadable digital certificates from affected devices.
Image. Scope of What an Attacker Can Understand About the Compromised Companies, Without Considering the Leaked Credentials.

Since Belsen Group had access to this data since 2022, affected organizations should assume that:

  • Attackers may have modified configurations and created hidden admin accounts.
  • Persistent threats may still exist within compromised systems.
  • Fortinet's patch does not mitigate prior intrusions if attackers already had internal network access.

Lessons Learned & Recommendations

This incident underscores the importance of:

  1. Proactive monitoring: Not only monitoring external attack surfaces, but also tracking underground forums and data leaks, as performed by Cattleya's leak detection module.
  2. Patching Alone Is Not Enough: Keeping systems up to date does not guarantee they weren’t previously compromised.
  3. Multi-Factor Authentication (MFA): This should be a mandatory security standard in any critical environment.
  4. Configuration Audits: Organizations must regularly review devices for unauthorized access and suspicious changes.

If you want to check if your company is affected by this or other data breaches, Cattleya platform offers a ≫15-day Demo so you can explore the product's capabilities.

Share the knowledge:
Tagged under: 7way Security, cybersecurity, Devices vulnerable, filtration of data critical, risks, vulnerability analysis

What you can read next

7Way_Security_BLOG_Telegram_Deep_Dark_Web
What is Telegram reliable in the Deep Web and Dark Web?
Desarrollo_seguro__7way_security
Hackers and Developers: Partners for a safe software
Suplantaciones_en_Colombia_Cattleya_7way_Security_2025
Phishing trademark colombian

SEARCH

RECENT ARTICLES

  • Black_Team_Gestion_de_riesgos_7way_security

    Risk management: The cornerstone of business success

    La gestión de riesgos debería ser una de las pr...
  • IA_en_Ciberseguridad_5_Desafíos_legales_urgentes_para_empresas_7way_security

    AI in Cybersecurity: 5 legal challenges urgent for companies

    What is your strategy AI is on the verge of convertirs...
  • Es_vulnerable_tu_IA?_riesgos_del_prompt_Injection_y_más

    Is your AI vulnerable? Risks of prompt Injection and more...

    Each time it becomes more common the development of a...
  • APT_y_Empresas_Identificando_los_riesgos_del_enemigo_silencioso_7way_security

    APT and Businesses: Identifying the risks of the silent enemy

    Technology is intertwined with every aspect...
  • IA_segura_proteja_sus_LLMs_con_el_OWASP_Top_10_2025_7way_security

    IA secure: protect your LLMs with the OWASP Top 10 2025

    In recent years, models of language gr...

FILES

  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • April 2021

CATEGORIES

  • Blue Team
  • Cybersecurity
  • Development
  • Secure development
  • Documentation
  • Hardering
  • Threat Intelligence
  • Security monitoring
  • MVP
  • Networking
  • Pentesting
  • Penetration testing advanced
  • Incident Response
  • Defensive Security
  • Startup
  • Technology
  • Threat Intelligence

TOPICS OF INTEREST

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

ASK FOR ADVICE FROM OUR EXPERTS

Please, fill out this form and we will contact you as soon as possible

7WAY SECURITY

CIBERSECURITY THE RIGHT WAY.

POLICY FOR THE MANAGEMENT OF PERSONAL DATA

CONTACT us

Bogotá: Cra 49 # 128b 31 Office 201 – (601) 805 24 02

Whatsapp: (+57) 300 726 5036

E-mail: [email protected]

Business Developer: [email protected]

Resumes / CVs [email protected]

 

 

  • GET SOCIAL

© 2022 All rights reserved. 7WAY SECURITY.

TOP
en_USEN
es_COES en_USEN