Backdoors Never Die: 16,000+ Fortinet Devices Still Compromised with Sneaky Symlink Hack
This isn't your typical zero-day exploit. No fresh vulnerabilities here. Instead, attackers are using a persistence mechanism that lurks in the shadows after the original exploit has been patched. That’s right—patched but still exposed.
Here’s how it works:
-
Threat actors compromised FortiGate devices starting in 2023 using zero-days.
-
They planted symbolic links in the folder used to store SSL-VPN language files.
-
These symlinks quietly pointed back to the root filesystem.
-
Since language files are publicly accessible on FortiGates with SSL-VPN enabled, attackers retained read-only remote access to sensitive files—even after patching.
As of today, 16,620 Fortinet devices have been detected with this stealthy backdoor. And unless sysadmins take action, attackers still have a peephole into these systems.
Fortinet’s statement:
“This was achieved via creating a symbolic link... in a folder used to serve language files for the SSL-VPN. This modification took place in the user filesystem and avoided detection.”
As threats grow more subtle and persistent, cybersecurity isn’t just about blocking the initial breach; it’s about digging out the roots after the fire is out.
Stay sharp, stay patched, and never trust a quiet filesystem.
References: https://www.bleepingcomputer.com/news/security/over-16-000-fortinet-devices-compromised-with-symlink-backdoor/
Comments
Post a Comment