Backdoors Never Die: 16,000+ Fortinet Devices Still Compromised with Sneaky Symlink Hack


 A chilling reminder that patching isn’t always the end of the story—over 16,000 Fortinet devices are still compromised by a crafty symlink backdoor, according to fresh insights from The Shadowserver Foundation.

This isn't your typical zero-day exploit. No fresh vulnerabilities here. Instead, attackers are using a persistence mechanism that lurks in the shadows after the original exploit has been patched. That’s right—patched but still exposed.

Here’s how it works:

  • Threat actors compromised FortiGate devices starting in 2023 using zero-days.

  • They planted symbolic links in the folder used to store SSL-VPN language files.

  • These symlinks quietly pointed back to the root filesystem.

  • Since language files are publicly accessible on FortiGates with SSL-VPN enabled, attackers retained read-only remote access to sensitive files—even after patching.

As of today, 16,620 Fortinet devices have been detected with this stealthy backdoor. And unless sysadmins take action, attackers still have a peephole into these systems.

Fortinet’s statement:

“This was achieved via creating a symbolic link... in a folder used to serve language files for the SSL-VPN. This modification took place in the user filesystem and avoided detection.”

As threats grow more subtle and persistent, cybersecurity isn’t just about blocking the initial breach; it’s about digging out the roots after the fire is out.

Stay sharp, stay patched, and never trust a quiet filesystem


References: https://www.bleepingcomputer.com/news/security/over-16-000-fortinet-devices-compromised-with-symlink-backdoor/

Comments

Popular posts from this blog

CISA and ENISA enhance their Cooperation

Splunk: Cybersecurity Dynamics Rapidly Changing

vSphere DR and Migration Improvements