January 16, 2025

Hacker Group Belsen Group leaks 15,000+ FortiGate credentials on dark web

Precursor Security have observed a hacking group sharing over 15,000 credentials for FortiGate devices following a historic mass exploitation campaign. In this blog we'll explain the attack and provide advice on how we can help.

Get Your 'Vulnerability Management Template' FREE!‍

Your Vulnerability Management Template Includes:

  • Full Vulnerability Identification Process Documents
  • Easy to Follow Process Diagrams
  • System and Data Criticality Definitions
  • Vulnerability Triage Process
  • Remediation Allocation Process
  • Root Cause Analysis Process

Secure your organisation today by completing the form for your Vulnerability Management Template.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Download the, 'How to secure Microsoft Office Desktop Deployments Technical Guide' - FREE

  • 15 Technical Controls to help secure your users and keep your business safe.
  • 100’s of reference group policy objects to implement the controls
  • Reference material to learn more about each control

Complete the form to download your free technical guide and secure your organisation today.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Download the Cyber Essentials Template Policy Pack - FREE

Complete the form to download your FREE Cyber Essentials Template Pack today, including:

  • User Management Policy
  • Patch Management Policy
  • Mobile Device Management Policy
  • Information Security Policy
  • Device Build Policy
  • Credential Management Policy
  • Account Usage Policy
  • Registers for all of the above policies

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Download the Microsoft 365 Security Guide  - FREE

Complete the form to download your FREE Microsoft 365 Security Guide today, including:

  • A checklist to ensure your organisation is protected.
  • Top tips you can distribute to employees to keep your data safe.
  • Recommended secure configuration settings for your environment.

Sign up on the form and receive the guide instantly.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

15,000 credentials leaked

On January 14th, a hacking group – known as ‘Belsen Group’ – claims to have leaked over 15,000 credentials for FortiGate devices, on a dark web forum. FortiGate credentials are especially valuable for facilitating the initial access point into an organisations internal network.

The group claims to have leaked IP addresses, passwords and contents of configs. It’s understood that the group have did this to gain “reputation” in the cyber criminal underworld, by giving away these credentials for free.

Security researchers analysing this data leak claim that the data was originally gathered by attackers in 2022, based on analysis of the configuration files pointing to FortiOS versions 7.0.0-7.0.6 or 7.2.0-7.2.2. Around this time, there was a relevant vulnerability tracked under CVE-2022-40684.

This vulnerability allows attackers to perform operations on the administrative interface of FortiGate appliances, potentially facilitating the theft of credentials.

The Exposure

Assessing Shodan results shows that over 9,000 FortiGate devices are in the UK, with varying industries, sectors and sizes related to these devices. Whilst FortiGate exploitation has remained at its peak for atleast two years now and patching has been priority, the rotation of credentials might have been something that has gone ignored by technical teams.

How Precursor Can Help

If you’d like to know if you’re impacted, please reach out to info@precursorsecurity.com.

We also offer a suite of relevant services such as:

·      Incident Response

·      24x7 Managed UK SOC (CREST)

·      Penetration Testing (CREST)

Ready for a true 24x7 cyber risk management solution from a CREST-Accredited SOC?

Get Your CREST 'What is a Security Operations Centre?' Guide!

It’s important to know what you’re getting, what’s not included and what else is available. This starts with understanding a SOC and it’s critical functions. CREST has recently published a guide to the critical functions of a SOC which aligns with the CREST SOC standard.

Enter your details here and to get the complete guide instantly sent to your inbox.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Why choose us?

Choose Precursor Security for penetration testing excellence—where industry-leading expertise, CREST accreditation, and a client-focused approach converge to fortify your digital defences with precision and reliability.

Written by

Precursor Security

Welcome to Precursor Security, where the forefront of cybersecurity and penetration testing expertise meets unmatched dedication and innovation. We are the architects of robust digital defences, committed to safeguarding the online realm.

menu