Hackers Gone Wild: FortiGate Devices Exposed in Massive Data Dump Disaster

A new hacking group, the Belsen Group, leaked sensitive data from over 15,000 FortiGate devices, exposing IP addresses and VPN credentials. They shared the data for free on the dark web, making it a cybercriminal’s buffet. Cybersecurity expert Kevin Beaumont links the leak to a 2022 zero-day vulnerability, CVE-2022–40684.

Pro Dashboard

Hot Take:

Just when you thought your New Year’s resolution was going to be switching to a healthier diet, it turns out you’ll be switching all your passwords instead. Thank you, Belsen Group, for showing us that oversharing isn’t just for social media anymore. Looks like cybersecurity is the new black, and the fashion faux pas is having your VPN credentials exposed on the dark web. Who knew hackers could be such trendsetters?

Key Points:

  • Belsen Group leaks 15,000 FortiGate devices’ sensitive data on the dark web.
  • Data includes configuration files, IP addresses, and VPN credentials.
  • The leak may be related to the CVE-2022–40684 zero-day vulnerability.
  • The data dump is organized by country and device IP address.
  • FortiGate admins advised to change credentials if not already done.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?