Fortinet says hackers accessed ‘limited’ number of customer files on third-party drive

Avatar

Security giant Fortinet said it has contacted some of its customers about a security incident where a hacker accessed files stored on a drive operated by an unnamed third party.

The company did not respond to a range of questions about the incident but told Recorded Future News that someone “gained unauthorized access to a limited number of files stored on Fortinet’s instance of a third-party cloud-based shared file drive.”

The file drive “included limited data related to a small number of Fortinet customers,” and the company said it has communicated directly with customers “as appropriate.” 

“To-date there is no indication that this incident has resulted in malicious activity affecting any customers. Fortinet’s operations, products, and services have not been impacted,” a spokesperson said. 

Questions about how many customers were affected and what kind of data was accessed were not answered. 

The incident was first reported by Australian news outlet CyberDaily, which said it was told some customers were based in the Asia-Pacific region and that the theft occurred last month. 

Fortinet is one of the world’s largest cybersecurity companies, last month reporting a revenue of $1.43 billion in the second quarter of 2024.  

In 2021, the company suffered another security incident where a cybercriminal gang assembled a collection of access credentials for more than 87,000 FortiGate SSL-VPN devices.

CybercrimeNewsNews BriefsTechnologyIndustry
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Payment-processing company says data breach potentially affected 1.7 million people

Next Post

US sanctions Cambodian tycoon for alleged human trafficking to cyber scam centers

Related Posts

Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails

Microsoft has shed light on an ongoing phishing campaign that targeted the hospitality sector by impersonating online travel agency Booking.com using an increasingly popular social engineering technique called ClickFix to deliver credential-stealing malware. The activity, the tech giant's threat intelligence team said, started in December 2024 and operates with the end goal of conducting
Avatar
Read More

Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks

Gcore’s latest DDoS Radar report analyzes attack data from Q3–Q4 2024, revealing a 56% YoY rise in the total number of DDoS attacks with the largest attack peaking at a record 2 Tbps. The financial services sector saw the most dramatic increase, with a 117% rise in attacks, while gaming remained the most-targeted industry. This period’s findings emphasize the need for robust, adaptive DDoS
Avatar
Read More

How to Improve Okta Security in Four Steps

While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this
Avatar
Read More