{"id":994670,"date":"2026-02-25T11:47:43","date_gmt":"2026-02-25T06:17:43","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=994670"},"modified":"2026-02-25T11:47:43","modified_gmt":"2026-02-25T06:17:43","slug":"amazon-says-russian-speaking-hacker-used-ai-to-hit-one-of-worlds-most-deployed-network-firewalls-in-5-weeks","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2026\/02\/25\/amazon-says-russian-speaking-hacker-used-ai-to-hit-one-of-worlds-most-deployed-network-firewalls-in-5-weeks\/","title":{"rendered":"Amazon says Russian-speaking hacker used AI to hit one of world&#8217;s most deployed network firewalls in 5 weeks"},"content":{"rendered":"<p>Amazon Threat Intelligence has revealed that a single \u201cunsophisticated\u201d attacker has compromised more than 600 organisations across 55 countries in just over a month. According to the company&#8217;s findings, the campaign ran from January 11 to February 18, 2026, and targeted FortiGate firewalls \u2013 some of the most common security devices used by businesses worldwide. The hacker didn\u2019t use any complex \u201czero-day\u201d exploits or secret software flaws. Instead, they used commercial AI tools to automate the \u201cgrunt work\u201d of cybercrime.<\/p>\n<p>\u201cThis investigation highlights how commercial AI services can lower the technical barrier to entry for offensive cyber capabilities. The threat actor in this campaign is not known to be associated with any advanced persistent threat group with state-sponsored resources. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amazon Threat Intelligence has revealed that a single \u201cunsophisticated\u201d attacker has compromised more than 600 organisations across 55 countries in just over a month. According to the company&#8217;s findings, the campaign ran from January 11 to February 18, 2026, and targeted FortiGate firewalls \u2013 some of the most common security devices used by businesses worldwide. The hacker didn\u2019t use any complex \u201czero-day\u201d exploits or secret software flaws. Instead, they used commercial AI tools to automate the \u201cgrunt work\u201d of cybercrime. \u201cThis investigation highlights how commercial AI services can lower the technical barrier to entry for offensive cyber capabilities. The threat [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[87,4,11],"tags":[],"class_list":["post-994670","post","type-post","status-publish","format-standard","hentry","category-it-2-the-times-of-india","category-newspapers","category-the-times-of-india"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/994670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=994670"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/994670\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=994670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=994670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=994670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}