Fortinet has just disclosed that it has suffered a data breach after a threat actor gained unauthorized access to a third-party it used.
Initially, the data breach at Fortinet was detected on a hacking forum, with the threat actor claiming that their Azure SharePoint was leaked, with 440 GB of data. This is part of what the company said:
An individual gained unauthorized access to a limited number of files stored on Fortinet’s instance of a third-party cloud-based shared file drive, which included limited data related to a small number (less than 0.3%) of Fortinet customers.
Evan Dornbush, former NSA cybersecurity expert had this to say:
Modern business IT ecosystems are complex, relying on external providers and a hodgepodge of “shared responsibility” agreements as pertains to security. So long as the data is valuable, attackers will take interest.
This could become an interesting 8-k as the breach is Fortinet’s material event (as defined by the SEC) even if the customer data was stored on a third-party platform. As of the time of this writing how the access occurred has not been disclosed (at least I haven’t been able to find it).
Ted Miracco, CEO, Approov follows with this:
“Data centers are now as vital as power plants—meaning tighter security, more government oversight, and faster responses to cyber threats. Expect more scrutiny, but also more investment in the sector. This recognition highlights the critical role that data centers play in supporting the healthcare, finance, and broader public services sectors of the economy, particularly in light of growing cyber threats and the increasing reliance on digital infrastructure.
“Though good for security and investment, this could hamper innovation with over-regulation. It’s a necessary step, but bureaucratic hurdles could be an issue. Given that data centers house sensitive information, such as NHS patient records and financial data, their inclusion in CNI status means they will receive prioritized access to security resources like the National Cyber Security Centre (NCSC). This added layer of oversight and support can improve incident response, reduce downtime, and protect critical data during outages or attacks.
“The move should improve overall resilience against attacks, but unless the private sector steps up on security innovation, it may not stop the next big breach. Cybersecurity vendors, especially those providing robust API and cloud security solutions may see this development as an opportunity to expand into the CNI-protected sectors by offering more advanced security services tailored for data centers.”
Finally Stephen Gates, Principal Security SME, Horizon3.ai:
“As someone deeply motivated by security, I see this as a crucial step in safeguarding citizens, public and private sector organizations, and the nation as a whole. Today’s critical infrastructures—such as energy, water, and emergency services, and so on—already rely heavily on the continuous operation of the nation’s data centres.
“With these data centres now being classified similar to other critical infrastructure, they will likely be subject to the same regulations and directives designed to protect private data, ensure operational uptime, and demonstrate cyber resilience. Additionally, the need for continuous cyber risk assessments of these environments will be imperative to identifying cyber risks, mitigating emerging threats, and ensuring that these centres remain resilient against evolving cyberattacks.”
Clearly Fortinet are trying to minimize the scope of this as 440 GB doesn’t sound like a “limited number of files” to me. That likely means that this is pretty bad. And when the details finally appear, we won’t like the scope of this hack at all.


Fortra Discovers Sophisticated QR Code Phishing Campaign That Targets Office 365 Users
Posted in Commentary with tags Fortra on September 15, 2024 by itnerdGlobal cybersecurity software and solutions provider Fortra has discovered a sophisticated QR code phishing campaign specifically targeting Microsoft Office 365 users across various industries, including finance and healthcare. In this campaign, employees are tricked into scanning a QR code sent through a blank email. That code redirects them to a highly personalized phishing page tailored to look like their company’s Office 365 login portal.
Now at this time, I don’t have a link to send you to read this document on for yourself. But here’s how the campaign works:
Why this matters:
Thus the take home message is that scanning QR codes is becoming a risky endeavour. Thus if you get one from via email from someone that you don’t know, or that you don’t expect, your best course of action is to perhaps delete it and report it to your IT department as it might be dangerous.
1 Comment »