Fortinet and Crime Stoppers International (CSI), the world’s only global crime reporting platform, today announced the launch of a global partnership and pioneering Cybercrime Bounty program. The partnership with CSI introduces a collaborative program to allow more expansive action against cybercrime, including converged crime. The initial output of the partnership is the Cybercrime Bounty, an initiative designed to encourage individuals worldwide to safely and anonymously report cybercriminal activity, thereby strengthening cyber resilience for organizations and governments and furthering Fortinet’s collaborative efforts with public and private sector partners to advance collective action against cybercrime.
This first-of-its kind Cybercrime Bounty program will demonstrate how collaboration can accelerate innovation, intelligence sharing, coordinated response, and tangible accountability results, driving real cybercrime deterrence and disruption.
Through this unique collaboration, CSI will leverage its trusted anonymous reporting infrastructure to provide a secure channel for citizens and ethical hackers to share information about cyberthreats. Fortinet will contribute its expertise in threat intelligence and cybersecurity innovation to validate, analyze, and put reports into action, where appropriate, routing cybersecurity threat intelligence packages to law enforcement partners for investigations, arrests, and prosecutions.
Together, the shared expertise and resources of the Fortinet and CSI partnership and the Cybercrime Bounty will incentivize disruption, strengthening national and economic security.
A Global Call to Action
The Cybercrime Bounty program represents an unprecedented collaboration between a community-based crime prevention organization and a global cybersecurity leader. It combines CSI’s trusted global network with Fortinet’s world-class threat intelligence expertise to deliver a practical, scalable solution to take on one of today’s most pressing cybersecurity challenges.
Accountability is key to deterrence. Fortinet has committed over 13 years to uniting public and private sectors to systematically disrupt cybercriminal operations and strengthen cyber resilience worldwide. Teamwork is critical to counter cybercriminals. Cybercrime is not a problem any one organization can solve alone; it requires continuous intelligence sharing, education, and a commitment to public-private cooperation at scale. This collaboration with CSI creates a Cybercrime Bounty initiative built to continue scaling deterrence.
A Global Disruption Framework and United Force Against Cybercrime
The Cybercrime Bounty program and initiative:
- Fosters community engagement and support: Disrupting organized cybercrime requires a global effort, with strong, trusted relationships between private-sector participants and public-sector organizations to align private intelligence and critical infrastructure at speed and across networks and borders. The Fortinet and CSI Cybercrime Bounty program aligns with other successful public-private collaborations that are dedicated to transparency and accountability.
- Scales disruption against cybercrime: Patterns and weak links are in full force now, requiring speed vs. sovereignty to work across borders without losing trust or privacy. Coordinated response and accountability break down the shift from ad hoc cooperation to scalable disruption.
- Leans into global cybersecurity and cybercrime prevention leadership: As a global leader in cybersecurity and stalwart dedicated to preventing cybercrime through systemic disruption, Fortinet delivers cyberthreat intelligence and visibility into cyber activity through its broad, integrated, and automated protections across the entire digital attack surface. The company also brings its long-standing commitment to pioneering efforts to disrupt cybercrime to this initiative, escalating accountability efforts to deter youth and other aspiring cybercriminals by sending a message that such actions will not go unaccounted for.
- Leverages Fortinet’s leadership role in shaping global cybersecurity collaboration: Relevant insights and experience that Fortinet brings to this Cybercrime Bounty effort include experience gained as a founding member of the World Economic Forum’s Cybercrime Atlas. The Cybercrime Atlas: Impact Report 2025 highlights the tangible progress achieved through multi-sector collaboration in dismantling cybercriminal networks and building resilience at scale. This cybercrime bounty effort with CSI builds on Fortinet’s long-standing collaborations with esteemed organizations from both the public and private sectors, including government entities, academia, and other public organizations, as a fundamental aspect of Fortinet’s commitment to enhancing global cyber resilience.
Hackers Exploit FortiWeb Devices to Deploy Sliver C2 for Persistent Access
Posted in Commentary with tags Fortinet on January 5, 2026 by itnerdResearchers have identified a threat actor who had exposed Sliver C2 databases and logs and successfully exploited multiple FortiWeb devices to deploy Sliver. This group also leveraged React2Shell (CVE-2025-55182) in order to deploy Sliver and leveraged the tool fast reverse proxy (FRP) to expose local services on victim hosts remotely.
More details here: https://ctrlaltintel.com/threat%20research/FortiWeb-Sliver/
Ensar Seker, CISO at threat intelligence company SOCRadar, commented:
“This is a textbook case of adversaries exploiting the weakest link in the network, outdated edge appliances. FortiWeb devices running unpatched firmware have become prime targets for initial access, and the deployment of the Sliver C2 framework shows how mature and stealthy these operations have become. Sliver, being an open-source post-exploitation tool, is now favored by both red teams and threat actors alike for its modularity and evasiveness.
What’s especially concerning is the use of Fast Reverse Proxy (FRP) to create persistent tunnels from within internal networks to attacker-controlled infrastructure. This is a clear attempt to sidestep traditional perimeter defenses and EDR visibility. It raises serious questions about visibility on network edge devices, which are often poorly monitored compared to endpoint systems.
This incident underscores the importance of aggressive patch management, zero-trust architecture, and strong monitoring of ingress/egress traffic from non-endpoint infrastructure like WAFs and VPN gateways. Simply deploying EDR is no longer enough if attackers can establish a persistent beachhead on devices outside its scope.”
This should be a wakeup call to get this sort of tech out of networks as soon as possible so that networks become more secure by default.
Leave a comment »