March 2025 - THOTMIn March 2025, GoSecure Threat Hunters investigated a growing threat targeting external remote services—such as VPN access points, Remote Desktop Protocol (RDP), and firewall management interfaces—frequently exposed to the public internet. Recent activity has revealed threat actors exploiting Fortinet vulnerabilities (CVE-2024-55591 and CVE-2025-24472) to gain unauthorized access and create persistent admin accounts through automation scripts. These tactics mirror methods used by ransomware groups like Play and LAPSUS$, who rely on stolen credentials and unprotected remote services to infiltrate corporate networks. 

Why This Matters 

External remote services are often necessary for enterprise operations, but if improperly secured, they become high-value targets for threat actors. Once inside the network, attackers can establish persistence, move laterally, and expand their foothold, often undetected. The exploitation of Fortinet devices demonstrates a dangerous trend: threat actors leveraging known vulnerabilities in widely used infrastructure to bypass perimeter defenses and maintain long-term access. 

Detection and Monitoring 

GoSecure hypothesized that adversaries were exploiting exposed remote services for initial access. A high-severity detection rule was developed to detect unauthorized admin accounts created via automation on Fortinet devices: 

Detection Rule: Persistent System Account Registered via Automation Script 

Description: Detects when a system admin account is added or modified by an automation script in FortiGate firewalls, tied to activity observed from the Morae_001 threat group. 

Recommendations 

To reduce exposure and mitigate the threat of unauthorized access via external remote services, GoSecure recommends the following actions: 

  • Limit Remote Access: Use firewalls, VPN concentrators, and RDP gateways to restrict unnecessary external access. 
  • Replace Exposed RDP: Transition away from native RDP or RDP gateways in favor of secured VPNs or Remote Access solutions with advanced controls like MFA and conditional access. 
  • Network Segmentation: Use DMZs, VPCs, and internal segmentation to isolate critical resources and limit lateral movement. 
  • Remove Unnecessary Services: Disable or uninstall remote services that are no longer in use. 
  • Enable MFA: Enforce multi-factor authentication on all externally facing services, including firewalls and VPNs. 
  • User Awareness: Train staff not to store work credentials in personal vaults or unsecured browsers. 

Conclusion 

This month’s Threat Hunt underscores the risks posed by exposed remote access points and the importance of proactive detection and response. GoSecure Titan® MXDR continuously monitors for signs of unauthorized access and persistent threats, enabling swift response and enhanced resilience against ransomware operations and advanced adversaries. Our Dark Web Monitoring helps identify compromised credentials before they can be exploited, while GoSecure Titan® Managed Perimeter Defense (MPD) ensures your externally facing assets are continuously protected and hardened against attack. 

For additional details or to speak with a GoSecure security expert, contact us at (888)-287-5858 or info@gosecure.ai. 

Stay secure! 

Your GoSecure Threat Hunting Team 

GoSecure Titan® Managed Extended Detection & Response (MXDR)​

GoSecure Titan® Managed Extended Detection & Response (MXDR)​ Foundation

GoSecure Titan® Vulnerability Management as a Service (VMaaS)

GoSecure Titan® Managed Security Information & Event Monitoring (Managed SIEM)

GoSecure Titan® Managed Perimeter Defense​ (MPD)

GoSecure Titan® Inbox Detection and Response (IDR)

GoSecure Titan® Secure Email Gateway (SEG)

GoSecure Titan® Threat Modeler

GoSecure Titan® Identity

GoSecure Titan® Platform

GoSecure Professional Security Services

Incident Response Services

Security Maturity Assessment

Privacy Services

PCI DSS Services

Penetration Testing Services​

Security Operations

MicrosoftLogo

GoSecure MXDR for Microsoft

Comprehensive visibility and response within your Microsoft security environment

USE CASES

Cyber Risks

Risk-Based Security Measures

Sensitive Data Security

Safeguard sensitive information

Private Equity Firms

Make informed decisions

Cybersecurity Compliance

Fulfill regulatory obligations

Cyber Insurance

A valuable risk management strategy

Ransomware

Combat ransomware with innovative security

Zero-Day Attacks

Halt zero-day exploits with advanced protection

Consolidate, Evolve & Thrive

Get ahead and win the race with the GoSecure Titan® Platform

24/7 MXDR FOUNDATION

GoSecure Titan® Endpoint Detection and Response (EDR)

GoSecure Titan® Next Generation Antivirus (NGAV)

GoSecure Titan® Security Information & Event Monitoring (SIEM)

GoSecure Titan® Inbox Detection and Reponse (IDR)

GoSecure Titan® Intelligence

OUR SOC

Proactive Defense, 24/7

AICPA SOC Logo - Black

ABOUT GOSECURE

GoSecure is a recognized cybersecurity leader and innovator, pioneering the integration of endpoint, network, and email threat detection into a single Managed Extended Detection and Response (MXDR) service. For over 20 years, GoSecure has been helping customers better understand their security gaps and improve their organizational risk and security maturity through MXDR and Professional Services solutions delivered by one of the most trusted and skilled teams in the industry.

EVENT CALENDAR

LATEST PRESS RELEASE

GOSECURE BLOG

SECURITY ADVISORIES

 24/7 Emergency – (888)-287-5858