Opportunistic Threat Actors Exploit Weak Authentication and AI Tools
TL;DR
Recent activities highlight how threat actors are capitalizing on weak authentication practices and generative AI tools. ESET’s analysis reveals significant vulnerabilities affecting global FortiGate devices due to poor security practices.
Main Analysis
In February 2026, ESET Chief Security Evangelist Tony Anscombe reported on the implications of several cybersecurity incidents, particularly focusing on the exploitation of over 600 FortiGate devices across 55 countries. The attackers leveraged exposed management ports and weak credentials, notably exploiting the absence of two-factor authentication. This trend emphasizes the need for organizations to fortify their security measures around device management and authentication protocols.
Moreover, the emergence of PromptSpy, an Android malware that utilizes generative AI for context-aware user interface manipulation, illustrates a concerning adaptation of technology by cybercriminals. This incident demonstrates that threat actors are not only targeting traditional vulnerabilities but are also innovating by integrating advanced tools to increase the effectiveness of their attacks.
Additionally, the FBI has issued warnings regarding a surge in jackpotting attacks in the U.S., where malware is employed to manipulate ATMs into dispensing large sums of cash. This method reflects a shift toward more sophisticated attack vectors that pose immediate risks to financial institutions and their customers.
Defensive Context
Organizations that operate FortiGate devices should take note of this alarming trend, as these vulnerabilities translate directly to real-world security risks. Entities that lack proper management and authentication strategies are at heightened risk of compromise. Conversely, organizations without such infrastructure may not find themselves immediately affected by these exploits but should remain mindful of the broader implications of weak security practices.
Why This Matters
The reported activities pose significant risks to sectors reliant on network devices and IT infrastructure. Businesses, particularly those in critical infrastructure and financial sectors, should acknowledge their exposure to these types of threats, as compromised devices can lead to severe operational disruptions and financial losses.
Defender Considerations
Entities managing FortiGate devices must assess their configurations, ensuring that management ports are secured and two-factor authentication is implemented where applicable. Insights into the operational mechanisms of PromptSpy may also offer detection opportunities, encouraging organizations to fortify their defenses against context-aware malware techniques.
Indicators of Compromise (IOCs)
While the article did not specify direct IOCs, the exploitation of exposed management ports and weak credentials on FortiGate devices are key indicators of current vulnerabilities. Continued monitoring of authentication practices and configuration management is essential for identifying potential threats.



