Fortinet says hackers accessed ‘limited’ number of customer files on third-party drive

Avatar

Security giant Fortinet said it has contacted some of its customers about a security incident where a hacker accessed files stored on a drive operated by an unnamed third party.

The company did not respond to a range of questions about the incident but told Recorded Future News that someone “gained unauthorized access to a limited number of files stored on Fortinet’s instance of a third-party cloud-based shared file drive.”

The file drive “included limited data related to a small number of Fortinet customers,” and the company said it has communicated directly with customers “as appropriate.” 

“To-date there is no indication that this incident has resulted in malicious activity affecting any customers. Fortinet’s operations, products, and services have not been impacted,” a spokesperson said. 

Questions about how many customers were affected and what kind of data was accessed were not answered. 

The incident was first reported by Australian news outlet CyberDaily, which said it was told some customers were based in the Asia-Pacific region and that the theft occurred last month. 

Fortinet is one of the world’s largest cybersecurity companies, last month reporting a revenue of $1.43 billion in the second quarter of 2024.  

In 2021, the company suffered another security incident where a cybercriminal gang assembled a collection of access credentials for more than 87,000 FortiGate SSL-VPN devices.

CybercrimeNewsNews BriefsTechnologyIndustry
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Payment-processing company says data breach potentially affected 1.7 million people

Next Post

US sanctions Cambodian tycoon for alleged human trafficking to cyber scam centers

Related Posts

New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

Cybersecurity researchers have discovered new artifacts associated with an Apple macOS malware called ZuRu, which is known to propagate via trojanized versions of legitimate software. SentinelOne, in a new report shared with The Hacker News, said the malware has been observed masquerading as the cross‑platform SSH client and server‑management tool Termius in late May 2025. "ZuRu malware
Avatar
Read More

⚡ THN Weekly Recap: iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More

Can a harmless click really lead to a full-blown cyberattack? Surprisingly, yes — and that’s exactly what we saw in last week’s activity. Hackers are getting better at hiding inside everyday actions: opening a file, running a project, or logging in like normal. No loud alerts. No obvious red flags. Just quiet entry through small gaps — like a misconfigured pipeline, a trusted browser feature,
Avatar
Read More