Skip to main content
Security 2 min read 511 views

CyberStrikeAI: Open-Source AI Attack Tool Compromises 600+ FortiGate Devices Across 55 Countries

Team Cymru and Amazon CTI reveal that CyberStrikeAI, an open-source AI-native offensive security tool, was used to compromise over 600 Fortinet FortiGate firewalls across 55 countries by exploiting exposed management ports and weak credentials at machine scale.

TD

TechDrop Editorial

Share:

Team Cymru and Amazon's Cyber Threat Intelligence team have linked infrastructure from CyberStrikeAI — an open-source AI-native offensive security platform — to a campaign that compromised over 600 Fortinet FortiGate firewalls across 55 countries between January 11 and February 18, 2026.

The Tool

CyberStrikeAI is an AI-native security testing platform written in Go and published on GitHub by a developer using the alias Ed1s0nZ. The tool integrates over 100 security tools with an intelligent orchestration engine that uses generative AI — reportedly from Claude and DeepSeek — to coordinate reconnaissance, vulnerability assessment, and exploitation activities. It features role-based testing capabilities, a specialized skills system, and a web dashboard for managing operations. On January 5, 2026, Ed1s0nZ added a credential to their GitHub profile: the CNNVD 2024 Vulnerability Reward Program Level 2 Contribution Award, where CNNVD is operated by China's Ministry of State Security.

Attack Method

Notably, the campaign did not exploit zero-day vulnerabilities in FortiGate devices. Instead, CyberStrikeAI was used to systematically identify and exploit FortiGate appliances with exposed management ports and weak single-factor authentication — fundamental security gaps that the AI tool helped an unsophisticated actor exploit at unprecedented scale. The tool automated the discovery of exposed management interfaces, credential testing, and post-exploitation activities across hundreds of targets simultaneously.

Infrastructure

Team Cymru observed 21 unique IP addresses running CyberStrikeAI between January 20 and February 26, 2026, with servers primarily hosted in China, Singapore, and Hong Kong. The campaign demonstrates a concerning trend: open-source AI security tools designed for legitimate penetration testing are being repurposed for offensive operations, lowering the technical barrier for large-scale network compromise and enabling attackers to operate at machine speed against thousands of targets simultaneously.

Related Articles