CyberStrikeAI: Open-Source AI Attack Tool Compromises 600+ FortiGate Devices Across 55 Countries
Team Cymru and Amazon CTI reveal that CyberStrikeAI, an open-source AI-native offensive security tool, was used to compromise over 600 Fortinet FortiGate firewalls across 55 countries by exploiting exposed management ports and weak credentials at machine scale.
Team Cymru and Amazon's Cyber Threat Intelligence team have linked infrastructure from CyberStrikeAI — an open-source AI-native offensive security platform — to a campaign that compromised over 600 Fortinet FortiGate firewalls across 55 countries between January 11 and February 18, 2026.
The Tool
CyberStrikeAI is an AI-native security testing platform written in Go and published on GitHub by a developer using the alias Ed1s0nZ. The tool integrates over 100 security tools with an intelligent orchestration engine that uses generative AI — reportedly from Claude and DeepSeek — to coordinate reconnaissance, vulnerability assessment, and exploitation activities. It features role-based testing capabilities, a specialized skills system, and a web dashboard for managing operations. On January 5, 2026, Ed1s0nZ added a credential to their GitHub profile: the CNNVD 2024 Vulnerability Reward Program Level 2 Contribution Award, where CNNVD is operated by China's Ministry of State Security.
Attack Method
Notably, the campaign did not exploit zero-day vulnerabilities in FortiGate devices. Instead, CyberStrikeAI was used to systematically identify and exploit FortiGate appliances with exposed management ports and weak single-factor authentication — fundamental security gaps that the AI tool helped an unsophisticated actor exploit at unprecedented scale. The tool automated the discovery of exposed management interfaces, credential testing, and post-exploitation activities across hundreds of targets simultaneously.
Infrastructure
Team Cymru observed 21 unique IP addresses running CyberStrikeAI between January 20 and February 26, 2026, with servers primarily hosted in China, Singapore, and Hong Kong. The campaign demonstrates a concerning trend: open-source AI security tools designed for legitimate penetration testing are being repurposed for offensive operations, lowering the technical barrier for large-scale network compromise and enabling attackers to operate at machine speed against thousands of targets simultaneously.
Related Articles
Cloudflare 2026 Threat Report: 230 Billion Daily Blocked Threats and the Rise of Credential Attacks
Cloudflare has published its inaugural annual threat report revealing the company blocks over 230 billion threats daily across 20% of global web traffic. DDoS attacks doubled year-over-year to 47.1 million incidents, with the largest reaching a record 31.4 Tbps, while bots now account for 94% of all login attempts.
HashiCorp Patches Consul Arbitrary File Read Vulnerability in Kubernetes Auth
HashiCorp has released emergency patches for Consul to address CVE-2026-2808, a medium-severity vulnerability allowing arbitrary file reads when Kubernetes authentication is enabled. The fix also adds HTTP server timeouts to prevent Slowloris denial-of-service attacks against Consul agent endpoints.
Let's Encrypt Now Issues Six-Day Certificates and IP Address Certificates via Certbot
Let's Encrypt and the EFF have announced support for six-day (160-hour) certificates and IP address certificates through Certbot 5.3 and 5.4. The ultra-short-lived certificates reduce the impact window of compromised keys by design, while IP address certificates enable HTTPS for services identified by address rather than hostname.