AI-Assisted Threat Actor Breaches 600+ FortiGate Devices Globally; CISA Adds Actively Exploited Roundcube Flaws to KEV Catalog
Critical Infrastructure Intelligence Briefing
Reporting Period: February 15–22, 2026
Published: Sunday, February 22, 2026
1. Executive Summary
This week's intelligence highlights a significant escalation in AI-assisted cyberattacks targeting network infrastructure, with a Russian-speaking threat actor compromising over 600 FortiGate devices across 55 countries using commercial generative AI tools. This campaign represents a concerning evolution in threat actor capabilities and the democratization of sophisticated attack methodologies.
Key Developments:
- AI-Enabled Attack Campaign: A financially motivated threat actor leveraged commercial AI services to accelerate exploitation of FortiGate firewalls, achieving unprecedented scale in just five weeks. Amazon and Fortinet have issued coordinated warnings.
- Active Exploitation of Webmail Infrastructure: CISA added two Roundcube vulnerabilities to the Known Exploited Vulnerabilities (KEV) catalog, indicating active targeting of email infrastructure—a critical communication backbone for many organizations.
- VoIP Infrastructure at Risk: A critical vulnerability in Grandstream phone systems (CVE-2026-2329) enables unauthenticated remote code execution with root privileges, potentially exposing voice communications to interception.
- Mobile Surveillance Threat: New analysis reveals Predator spyware capabilities to evade iOS security indicators while conducting covert surveillance, raising concerns for high-value targets in critical infrastructure leadership.
- Supply Chain Compromise: A compromised npm package has been distributing the OpenClaw malware to developer machines, highlighting persistent software supply chain risks.
Immediate Actions Required:
- Organizations using FortiGate devices should immediately audit configurations, review logs for indicators of compromise, and ensure all patches are current
- Roundcube webmail deployments require immediate patching per CISA guidance
- Grandstream phone system operators should apply available patches and implement network segmentation
2. Threat Landscape
Nation-State and Advanced Threat Actor Activities
AI-Assisted FortiGate Campaign
The most significant development this week involves a Russian-speaking, financially motivated threat actor who successfully compromised more than 600 FortiGate firewall devices across 55 countries within a five-week period. This campaign is notable for its use of commercial generative AI services to:
- Automate vulnerability identification and exploitation
- Generate custom exploit code and payloads
- Scale attack operations beyond traditional manual capabilities
- Evade detection through AI-generated variations in attack patterns
Analysis: This campaign represents a significant inflection point in the threat landscape. The use of commercially available AI tools to accelerate and scale attacks suggests that similar techniques will become increasingly common across threat actor tiers. Critical infrastructure operators should anticipate that AI-assisted attacks will reduce the time between vulnerability disclosure and widespread exploitation.
Sources: The Hacker News, Bleeping Computer
Mobile Surveillance: Predator Spyware Evolution
Security researchers have documented new capabilities in Intellexa's Predator spyware that allow it to hook into iOS SpringBoard to hide microphone and camera activity indicators while secretly streaming feeds to operators. This technique bypasses Apple's privacy indicators designed to alert users when recording is active.
Implications for Critical Infrastructure:
- Executive leadership and key personnel in critical infrastructure sectors may be targeted for intelligence collection
- Sensitive operational discussions could be compromised without visible indicators
- Organizations should review mobile device policies for personnel with access to sensitive infrastructure information
Source: Bleeping Computer
Cybercriminal Developments
Supply Chain Attack: npm Package Compromise
A compromised npm package has been silently installing OpenClaw malware on developer machines. This supply chain attack vector poses significant risks to organizations developing software for critical infrastructure systems.
Risk Assessment:
- Development environments for ICS/SCADA software could be compromised
- Malicious code could be introduced into critical infrastructure control systems
- Organizations should audit npm dependencies and implement software composition analysis
Source: CSO Online
Emerging Attack Vectors
| Attack Vector | Target | Severity | Status |
|---|---|---|---|
| AI-Assisted Exploitation | Network Infrastructure (FortiGate) | CRITICAL | Active Exploitation |
| Webmail Vulnerabilities | Roundcube Deployments | HIGH | Active Exploitation (KEV) |
| VoIP RCE | Grandstream Phone Systems | CRITICAL | Patch Available |
| Supply Chain | npm Developer Ecosystem | HIGH | Active Distribution |
3. Sector-Specific Analysis
Energy Sector
Threat Level: ELEVATED
The FortiGate compromise campaign poses direct risks to energy sector organizations that rely on Fortinet products for network security. Energy sector entities should prioritize:
- Immediate audit of all FortiGate devices for indicators of compromise
- Review of network segmentation between IT and OT environments
- Enhanced monitoring of firewall configuration changes
- Verification that management interfaces are not exposed to the internet
Recommended Action: Energy sector ISACs should coordinate threat intelligence sharing regarding observed FortiGate exploitation attempts within member organizations.
Water & Wastewater Systems
Threat Level: ELEVATED
Water utilities often operate with limited cybersecurity resources and may be particularly vulnerable to the types of attacks observed this week. Key concerns include:
- Many water utilities use Fortinet products for perimeter security
- Remote access capabilities for distributed infrastructure may be exposed
- Limited security monitoring capabilities may delay detection
Recommended Action: WaterISAC members should leverage shared resources for FortiGate configuration audits and consider implementing additional network monitoring at IT/OT boundaries.
Communications & Information Technology
Threat Level: HIGH
Multiple developments this week directly impact the communications sector:
Grandstream VoIP Vulnerability (CVE-2026-2329)
- Impact: Unauthenticated remote code execution with root privileges
- Risk: Call interception, network pivot point, surveillance
- Affected Systems: Grandstream phone systems widely deployed in enterprise environments
- Mitigation: Apply vendor patches immediately; implement network segmentation for VoIP infrastructure
Roundcube Webmail Exploitation
- CISA's addition of two Roundcube flaws to the KEV catalog indicates active targeting
- Email infrastructure compromise can enable further attacks through credential theft and business email compromise
- Organizations must patch within CISA-mandated timelines
Source: SecurityWeek, The Hacker News
Transportation Systems
Threat Level: MODERATE
While no transportation-specific incidents were reported this week, the sector should note:
- FortiGate devices are commonly deployed in transportation network infrastructure
- Aviation and maritime sectors should audit network security appliances
- Rail and mass transit operators should verify OT network isolation
Healthcare & Public Health
Threat Level: ELEVATED
Healthcare organizations face compounded risks from this week's developments:
- FortiGate devices protecting healthcare networks may be compromised
- Roundcube webmail is used by some healthcare organizations for email
- VoIP systems in healthcare facilities may be vulnerable to Grandstream flaws
- Predator spyware capabilities raise concerns for healthcare executive targeting
Recommended Action: Health-ISAC members should prioritize vulnerability scanning and patching across all identified vulnerable systems.
Financial Services
Threat Level: ELEVATED
Financial institutions should be particularly concerned about:
- The AI-assisted attack methodology, which may be adapted for financial sector targeting
- Supply chain risks from compromised developer tools
- VoIP interception risks for sensitive financial communications
4. Vulnerability & Mitigation Updates
Critical Vulnerabilities Requiring Immediate Attention
CISA Known Exploited Vulnerabilities (KEV) Additions
Date Added: February 21, 2026
| CVE | Product | Description | Remediation Deadline |
|---|---|---|---|
| TBD | Roundcube Webmail | Two actively exploited vulnerabilities | Per CISA BOD 22-01 |
Action Required: Federal agencies must remediate per CISA timelines. All organizations are strongly encouraged to prioritize patching.
Source: The Hacker News
CVE-2026-2329: Grandstream Phone Systems
- Severity: CRITICAL
- Attack Vector: Network (no authentication required)
- Impact: Remote code execution with root privileges
- Exploitation: Call interception, network compromise
Mitigation Steps:
- Apply vendor patches immediately
- Segment VoIP infrastructure from general network
- Implement access controls limiting management interface exposure
- Monitor for unusual VoIP traffic patterns
- Audit call logs for signs of interception
Source: SecurityWeek
FortiGate Security Recommendations
In response to the AI-assisted compromise campaign, organizations should implement the following measures:
Immediate Actions:
- Verify all FortiGate devices are running the latest firmware
- Audit administrative accounts for unauthorized access
- Review and restrict management interface access
- Enable and review logging for configuration changes
- Implement multi-factor authentication for all administrative access
Detection Indicators:
- Unexpected configuration changes
- New administrative accounts
- Unusual outbound connections from firewall devices
- Modified firewall rules or policies
- Disabled logging or security features
AI Security Tool Development
Anthropic has launched Claude Code Security, an AI-powered vulnerability scanning capability. While this represents a positive development for defensive capabilities, organizations should:
- Evaluate AI-assisted security tools as part of defense-in-depth strategies
- Maintain human oversight of AI-generated security recommendations
- Consider how AI tools can accelerate vulnerability identification in critical systems
Source: The Hacker News
5. Resilience & Continuity Planning
Lessons from the FortiGate Campaign
The AI-assisted FortiGate compromise campaign offers several important lessons for critical infrastructure resilience:
Key Takeaways:
- Speed of Exploitation: 600+ devices compromised in 5 weeks demonstrates the accelerated pace of AI-assisted attacks. Traditional patch cycles may be insufficient.
- Geographic Scope: 55 countries affected indicates no region is immune; global infrastructure operators must coordinate response.
- Defense Implications: Organizations must assume that AI-assisted attacks will become the norm and adjust defensive postures accordingly.
Resilience Recommendations:
- Reduce Attack Surface: Minimize internet-exposed management interfaces
- Implement Zero Trust: Assume network perimeter devices may be compromised
- Enhance Monitoring: Deploy behavioral analytics to detect anomalous device behavior
- Segment Networks: Ensure compromise of perimeter devices cannot directly impact OT systems
- Plan for Rapid Response: Develop playbooks for mass device compromise scenarios
Supply Chain Security Considerations
The npm package compromise highlights ongoing software supply chain risks:
- Implement software composition analysis (SCA) tools
- Maintain software bills of materials (SBOMs) for critical systems
- Establish vendor security assessment programs
- Consider air-gapped development environments for critical infrastructure software
Cross-Sector Dependencies
This week's threats highlight critical dependencies:
- Network Security Infrastructure: FortiGate devices protect multiple critical infrastructure sectors; compromise creates cascading risks
- Communications: VoIP and email vulnerabilities affect all sectors' ability to coordinate
- Software Development: Supply chain compromises can propagate across all sectors using affected components
6. Regulatory & Policy Developments
CISA Actions
CISA's addition of Roundcube vulnerabilities to the KEV catalog triggers mandatory remediation timelines for federal agencies under Binding Operational Directive (BOD) 22-01. While not mandatory for private sector organizations, critical infrastructure operators are strongly encouraged to:
- Treat KEV additions as high-priority patching requirements
- Align internal vulnerability management with CISA timelines
- Report exploitation attempts through appropriate channels
AI Workforce Development
EC-Council has expanded its AI certification portfolio to address workforce readiness and security concerns. Key statistics driving this initiative:
- $5.5 trillion in global AI risk exposure
- 700,000 U.S. workers requiring AI-related reskilling
- New certifications include Certified CISO v4 with AI security components
Implication for Critical Infrastructure: Organizations should evaluate AI security training requirements for security personnel, particularly given the emergence of AI-assisted attack methodologies.
Source: The Hacker News
Anticipated Regulatory Developments
Based on current threat trends, critical infrastructure operators should prepare for potential regulatory focus on:
- AI security requirements and governance frameworks
- Enhanced network device security standards
- Supply chain security attestation requirements
- Incident reporting for AI-assisted attacks
7. Training & Resource Spotlight
New Security Tools and Capabilities
Claude Code Security
Anthropic's new AI-powered vulnerability scanning tool offers:
- Automated codebase security analysis
- Vulnerability identification and patch suggestions
- Integration with development workflows
Critical infrastructure organizations developing custom software should evaluate this and similar tools for security enhancement.
Workforce Development
EC-Council AI Certifications
New certification offerings address the intersection of AI and cybersecurity:
- AI security fundamentals
- AI risk management
- Certified CISO v4 (includes AI security components)
Recommendation: Critical infrastructure organizations should consider incorporating AI security training into professional development programs.
Recommended Training Focus Areas
Based on this week's threat landscape, organizations should prioritize training in:
- Network device security and hardening
- AI-assisted attack recognition and response
- Supply chain security assessment
- Mobile device security for executives
- VoIP security and monitoring
8. Looking Ahead: Upcoming Events
NIST Events
Technologies and Use Cases for Smart Standards
- Date: March 19, 2026
- Focus: Standards development for AI, blockchain, and IoT technologies
- Relevance: Critical infrastructure operators should monitor standards development affecting emerging technology deployments
Building the Strategic Supply Chain Network
- Date: March 9, 2026
- Focus: Addressing supply chain vulnerabilities exposed by recent disruptions
- Relevance: Directly applicable to critical infrastructure supply chain resilience
Cybersecurity for IoT Workshop: Future Directions
- Date: March 31, 2026
- Focus: Emerging IoT security trends and implications
- Relevance: IoT security is increasingly critical for operational technology environments
Iris Experts Group Annual Meeting
- Date: June 25, 2026
- Focus: Iris recognition technology for government applications
- Relevance: Physical security and access control for critical infrastructure
Threat Awareness Periods
- Ongoing: Heightened vigilance for FortiGate exploitation attempts
- Ongoing: Monitor for Roundcube exploitation in organizational environments
- Q1 2026: Anticipate continued evolution of AI-assisted attack methodologies
Recommended Preparation Activities
- Conduct tabletop exercises focused on mass network device compromise scenarios
- Review and update incident response playbooks for AI-assisted attacks
- Assess organizational readiness for supply chain compromise events
- Evaluate mobile device security policies for executive personnel
Contact and Information Sharing
Critical infrastructure owners and operators are encouraged to:
- Report suspicious activity to CISA: www.cisa.gov/report
- Share threat intelligence through sector-specific ISACs
- Participate in public-private partnership initiatives
- Subscribe to CISA alerts and advisories
This briefing is derived from open-source intelligence and is intended to support critical infrastructure protection efforts. Recipients are encouraged to verify information through official channels and adapt recommendations to their specific operational environments.
This briefing is generated using AI analysis of public news sources. Always verify critical information through authoritative sources before taking action.