FortiGate Edge Attacks Turn Service Accounts Into Network Takeover Tools
Service accounts just became the new crown jewels for network attackers. Recent FortiGate edge device compromises aren't just about grabbing credentials anymore. They're about turning those stolen service accounts into launchpads for deep Active Directory infiltration and rogue workstation deployment.
This isn't your typical smash-and-grab credential theft. Attackers are getting sophisticated about how they use compromised FortiGate devices to establish persistent access through service account abuse.
The Attack Chain: From Edge to Core
The attack pattern starts predictably enough. Threat actors target vulnerable FortiGate devices, often exploiting known CVEs that organizations haven't patched yet. But here's where things get interesting.
Instead of immediately moving laterally with stolen user credentials, attackers are specifically hunting for service accounts. These accounts typically have elevated privileges across multiple systems and, crucially, they're designed to run unattended. Perfect for maintaining persistent access without triggering user behavior alerts.
Once they've compromised a service account, attackers aren't just using it for privilege escalation. They're using it to register entirely new workstations in the Active Directory domain. These rogue machines appear legitimate to security tools because they're properly domain-joined using valid service credentials.
Why Service Accounts Make Perfect Attack Vectors
Service accounts have become attractive targets for several technical reasons that most security teams overlook.
First, they rarely have the same monitoring applied to them as user accounts. Your SIEM might flag unusual login times for John from Accounting, but it probably won't blink at a service account authenticating at 3 AM. That's literally what service accounts do.
Second, service accounts often have permissions that span multiple systems. A single compromised service account might have access to file shares, databases, and domain controllers. It's like getting a master key instead of picking individual locks.
Third, service accounts don't change passwords as frequently as user accounts. Many organizations set service account passwords to never expire, creating persistent access that can last months or years after the initial compromise.
The Rogue Workstation Problem
Here's where this attack gets particularly nasty. Attackers are using stolen service accounts to join new machines to the Active Directory domain. These aren't just any machines though.
These rogue workstations get configured with legitimate-looking computer names and placed in standard organizational units. They receive group policy updates, connect to domain controllers, and behave like any other corporate asset. Except they're completely controlled by attackers.
From these rogue workstations, attackers can run additional reconnaissance tools, pivot to other network segments, and establish multiple persistence mechanisms. The workstations act as legitimate footholds that security tools trust implicitly.
Detection Gaps and Blind Spots
Most organizations aren't equipped to detect this type of attack because it exploits trust relationships rather than technical vulnerabilities.
Traditional endpoint detection tools might miss rogue workstations if they're properly domain-joined and receiving legitimate group policies. Network monitoring might not flag the traffic as suspicious because it's coming from domain-trusted machines.
Service account monitoring is particularly weak in most environments. Organizations track user logins religiously but often have no visibility into service account authentication patterns, privilege usage, or behavioral anomalies.
The FortiGate compromise itself might get detected and remediated, but the downstream service account abuse and rogue workstation deployment can persist long after the initial breach point is secured.
What This Means for Defense Strategies
This attack pattern exposes fundamental gaps in how organizations think about identity security and network trust.
First, service accounts need the same level of monitoring and behavioral analysis as user accounts. That means implementing service account password rotation, privilege reviews, and authentication monitoring specifically for non-human identities.
Second, workstation registration and domain joining processes need stronger controls. Organizations should implement approval workflows for new machine registrations and maintain inventories of authorized devices.
Third, the assumption that domain-joined machines are trustworthy needs to be challenged. Zero trust principles should apply to workstations just as much as they apply to users and applications.
The Bigger Picture: Identity as the New Perimeter
These FortiGate-initiated attacks represent a broader shift in how attackers think about network compromise. The old model was about breaking through perimeter defenses and then moving laterally through network segments.
The new model treats identity as the primary attack vector. Compromise the right identities, and network segmentation becomes irrelevant. Use those identities to establish legitimate-looking infrastructure, and detection becomes nearly impossible.
Service accounts, in particular, represent a massive blind spot for most security programs. They're powerful, persistent, and poorly monitored. For attackers, they're the perfect combination of access and invisibility.
Organizations need to start treating service account security with the same rigor they apply to privileged user accounts. That means regular password rotation, privilege reviews, behavioral monitoring, and strong controls around service account creation and management.
The days of treating service accounts as "set it and forget it" infrastructure are over. In today's threat environment, they're high-value targets that require active security management.