PULSE NAME
Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromise
WHITE AlienVault 2026-03-11 Modified: 2026-03-16
7
IOCs
LOW VOLUME
SentinelOne's DFIR team has responded to multiple incidents involving compromised FortiGate NGFW appliances used to establish footholds in targeted environments. Attackers exploited vulnerabilities or weak credentials to access FortiGate devices, extract configuration files containing service account credentials, and use those to join rogue workstations to Active Directory. In one case, the attacker used the access to deploy remote management tools and steal the NTDS.dit file. The incidents highlight the need for strong access controls, patching, and improved logging on edge devices. Organizations are advised to implement SIEM solutions to detect anomalous activity and automate responses.
Indicators of Compromise (7)
All CVE IPv4 domain
TYPEINDICATORDESCRIPTIONCREATED
CVE CVE-2025-59718 2026-03-11
CVE CVE-2025-59719 2026-03-11
CVE CVE-2026-24858 2026-03-11
IPv4 185.242.246.127 2026-03-11
IPv4 193.24.211.61 2026-03-11
domain ndibstersoft.com 2026-03-11
domain neremedysoft.com 2026-03-11