Fortinet says hackers accessed ‘limited’ number of customer files on third-party drive

Avatar

Security giant Fortinet said it has contacted some of its customers about a security incident where a hacker accessed files stored on a drive operated by an unnamed third party.

The company did not respond to a range of questions about the incident but told Recorded Future News that someone “gained unauthorized access to a limited number of files stored on Fortinet’s instance of a third-party cloud-based shared file drive.”

The file drive “included limited data related to a small number of Fortinet customers,” and the company said it has communicated directly with customers “as appropriate.” 

“To-date there is no indication that this incident has resulted in malicious activity affecting any customers. Fortinet’s operations, products, and services have not been impacted,” a spokesperson said. 

Questions about how many customers were affected and what kind of data was accessed were not answered. 

The incident was first reported by Australian news outlet CyberDaily, which said it was told some customers were based in the Asia-Pacific region and that the theft occurred last month. 

Fortinet is one of the world’s largest cybersecurity companies, last month reporting a revenue of $1.43 billion in the second quarter of 2024.  

In 2021, the company suffered another security incident where a cybercriminal gang assembled a collection of access credentials for more than 87,000 FortiGate SSL-VPN devices.

CybercrimeNewsNews BriefsTechnologyIndustry
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Payment-processing company says data breach potentially affected 1.7 million people

Next Post

US sanctions Cambodian tycoon for alleged human trafficking to cyber scam centers

Related Posts

10 Critical Network Pentest Findings IT Teams Overlook

After conducting over 10,000 automated internal network penetration tests last year, vPenTest has uncovered a troubling reality that many businesses still have critical security gaps that attackers can easily exploit. Organizations often assume that firewalls, endpoint protection, and SIEMs are enough to keep them secure. But how effective are these defenses when put to the test? That’s where
Avatar
Read More

Perfection is a Myth. Leverage Isn’t: How Small Teams Can Secure Their Google Workspace

Let’s be honest: if you're one of the first (or the first) security hires at a small or midsize business, chances are you're also the unofficial CISO, SOC, IT Help Desk, and whatever additional roles need filling. You’re not running a security department. You are THE security department. You're getting pinged about RFPs in one area, and reviewing phishing alerts in another, all while sifting
Avatar
Read More

Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads

Threat hunters are calling attention to a new variant of a remote access trojan (RAT) called Chaos RAT that has been used in recent attacks targeting Windows and Linux systems. According to findings from Acronis, the malware artifact may have been distributed by tricking victims into downloading a network troubleshooting utility for Linux environments. "Chaos RAT is an open-source RAT written in
Avatar
Read More