Hackers Exploit Unpatched FortiWeb Flaws Using Sliver C2

Article Highlights
Off On

The very security appliances designed to be a network’s first line of defense are increasingly becoming the primary vector for sophisticated intrusions, fundamentally altering the landscape of cyber warfare. A recent campaign highlights this dangerous trend, demonstrating how threat actors are exploiting unpatched FortiWeb devices to establish deep, persistent footholds within target organizations. By leveraging a publicly available command and control framework, these attackers transform trusted network gateways into covert conduits for malicious activity, challenging traditional security paradigms and forcing a reevaluation of perimeter defense strategies.

The Shifting Battlefield: Edge Devices as the New Front Line

Internet-facing security appliances, such as FortiWeb firewalls, serve as the gatekeepers of modern network architecture, filtering traffic and protecting sensitive internal assets from external threats. Their critical position at the network edge makes them indispensable for security, yet this same position also exposes them directly to adversaries. These devices are designed for high availability and performance, but they are not infallible. When vulnerabilities exist, they represent a high-value target for any attacker seeking to breach a network’s defenses. Consequently, the threat landscape has seen a decisive shift toward targeting these edge devices as the preferred initial access point. Instead of relying on phishing emails or user-targeted malware, attackers now probe for unpatched firewalls, VPN concentrators, and other perimeter appliances. Compromising one of these devices grants an attacker a powerful and privileged position from which to launch further attacks, often bypassing internal security controls that assume the perimeter is secure. This approach is efficient, effective, and increasingly common among sophisticated threat groups.

Anatomy of an Attack: From Vulnerability to C2 Deployment

The Rise of Open Source C2 Frameworks in Modern Attacks

Modern attack campaigns are characterized by a growing reliance on publicly available, open-source offensive security tools, a tactic that complicates attribution and detection. Threat actors are increasingly adopting frameworks like Sliver C2 because they offer powerful capabilities without the need for custom development, and their legitimate use by red teams helps them blend in with normal network traffic. This approach lowers the barrier to entry for sophisticated attacks and makes it more difficult for defenders to distinguish between malicious and benign activity. The initial access vector in this campaign centers on the exploitation of unpatched vulnerabilities in FortiWeb firmware, specifically targeting devices running outdated versions from 5.4.202 through 6.1.62. While the exact exploit chain remains unconfirmed, parallel operations have also utilized the React2Shell vulnerability (CVE-2025-55182), indicating the actors possess a versatile toolkit for gaining entry. This focus on known but unpatched flaws underscores the critical importance of timely security updates for internet-facing infrastructure.

Unveiling the Kill Chain: How Attackers Establish a Foothold

Following the initial breach, the attackers move swiftly to establish a persistent connection to their command and control infrastructure. A key tool in their post-exploitation playbook is the Fast Reverse Proxy (FRP), which they deploy on the compromised FortiWeb appliance. FRP creates a secure tunnel from the internal network back to the attackers’ C2 servers, effectively exposing internal services and allowing for sustained, covert access. This technique turns the security device against itself, using it as a beachhead for deeper infiltration.

This campaign’s inner workings were brought to light through the proactive efforts of analysts at Ctrl-Alt-Int3l. During routine open-directory threat hunting on the Censys platform, the team discovered exposed Sliver C2 databases and operational logs. This rare find provided an unfiltered view into the attackers’ methods, confirming that the compromised devices were running vulnerable firmware and revealing the specific tools and commands used to maintain control over their targets.

A Deceptive Campaign: Unpacking the Attacker’s Toolkit and Tactics

A significant element of this operation is the sophisticated decoy infrastructure established to mislead security teams and avoid detection. The attackers registered convincing domains like ns1.ubunutpackages[.]store and ns1.bafairforce[.]army, hosting fake content designed to appear legitimate upon inspection. One domain hosted a mock Ubuntu packages repository, while another featured a fake recruitment page for the Bangladesh Air Force, tactics clearly intended to lull network defenders into a false sense of security.

Analysis of the exfiltrated C2 logs provided a granular breakdown of the Sliver payload itself. The attackers used a specific command to generate a binary configured for maximum evasion, employing a “ubuntu” template to help it blend with other Linux system processes. This payload, named system-updater, was deployed to a hidden directory (/bin/.root/) on the compromised FortiWeb devices and configured to reconnect to the C2 server every 120 seconds, ensuring a resilient and persistent communication channel.

Beyond the Breach: Operational Impact and Regional Focus

The compromise of a core security appliance like a firewall has severe and far-reaching consequences. By gaining control of the device that inspects and routes all network traffic, an attacker achieves a position of immense power. This allows for long-term persistence that is difficult to detect, the potential to monitor or redirect sensitive data, and the ability to execute commands with high privileges. From this trusted vantage point, the threat actor can pivot to other systems within the network with relative ease.

Furthermore, the nature of the decoy infrastructure provides strong evidence of a strategic operational focus. The carefully themed domains, particularly the one mimicking a Bangladesh Air Force website, suggest that the threat actor is specifically targeting organizations within the South Asian region. This regional focus indicates a deliberate and targeted campaign rather than an opportunistic, widespread attack, pointing to an adversary with specific intelligence-gathering objectives.

The Road Ahead: Anticipating the Evolution of Edge Based Threats

This campaign serves as a clear indicator of the future trajectory of network-based attacks. The focus on unpatched edge devices is likely to intensify as organizations continue to strengthen endpoint and user-based defenses. These appliances represent a single point of failure that, if compromised, can unravel an entire security posture. The ongoing challenge of ensuring that all internet-facing systems are consistently patched and properly configured will remain a top priority for security teams.

Defenders face a growing challenge in detecting and mitigating threats that leverage legitimate-looking, open-source tools. As attackers increasingly “live off the land” or use dual-use frameworks like Sliver, traditional signature-based detection methods become less effective. The future of network defense will depend on behavioral analysis, proactive threat hunting, and a deep understanding of normal network patterns to identify the subtle anomalies that indicate a compromise.

Fortifying the Gates: Key Takeaways and Defensive Strategies

The investigation into this campaign revealed a potent combination of operational tactics, where unpatched vulnerabilities in critical infrastructure were exploited using sophisticated, publicly available tooling. The attackers demonstrated a clear understanding of network defense evasion, using themed decoys and masquerading their payloads as legitimate system utilities to achieve long-term persistence. This strategy proved highly effective in turning a network’s primary defense into its greatest liability.

Based on these findings, organizations were reminded of the imperative to implement a multi-layered defensive strategy. This included maintaining a rigorous patching cadence for all internet-facing appliances, enhancing network monitoring to detect anomalous outbound connections, and conducting proactive threat hunting for signs of C2 activity. Ultimately, defending against such threats required a shift from a reactive posture to one that actively anticipates and seeks out adversaries who have already found a way inside the gates.

Explore more

Massive Cyberattack Paralyzes Higham Lane School

The typically bustling corridors and digital channels of Higham Lane School and Sixth Form fell into an unnerving silence as a comprehensive and debilitating cyberattack brought all institutional operations to an immediate and indefinite halt. The security breach, which school leadership confirmed was significant in scale, effectively severed the school’s connection to the modern world by disabling its entire IT

Wget2 Flaw Allows Attackers to Overwrite System Files

The unassuming command-line utilities that power countless automated scripts and developer workflows often operate with an implicit level of trust, yet a newly discovered vulnerability in GNU Wget2 shatters this perception by turning a simple download command into a potential gateway for system takeover. A critical security flaw, identified as CVE-2025-69194, has been unearthed in the popular web content downloading

How Is RondoDox Botnet Exploiting React2Shell?

The digital landscape is currently witnessing a particularly dangerous convergence as the opportunistic RondoDox botnet rapidly weaponizes a critical flaw in one of the web’s most popular frameworks, creating a significant threat for enterprises and their interconnected device ecosystems. This potent combination of a versatile botnet and a high-severity vulnerability demands immediate attention from security teams. The RondoDox botnet, a

Singtel’s 50G Trial Signals a Shift to AI-Ready Networks

The unassuming fiber optic cable entering homes and businesses is on the verge of a monumental transformation, quietly being re-engineered to handle the unprecedented data demands of an AI-centric world. In Singapore, a nation synonymous with technological ambition, Singtel has initiated a groundbreaking trial of 50 Gbps fiber broadband. This pilot is far more than a simple speed test; it

FAB and Mastercard Debut Mobile Virtual Cards for Businesses

A New Era for Corporate Payments in the UAE Marking a pivotal shift in regional business finance, First Abu Dhabi Bank (FAB), the UAE’s largest financial institution, has partnered with Mastercard to introduce a pioneering mobile-first virtual card solution for its corporate and commercial clients. This collaboration marks the first launch of Mastercard’s mobile Virtual Card Number (VCN) platform in