Everything you need to know about the Fortinet data breach
Fortinet claims there is no evidence of malicious activity targeting customers in the wake of the breach


A Ukrainian-linked threat group has leaked 440 GB of data belonging to Fortinet on a popular hacking forum after ransom negotiations broke down.
On 12 September, a group operating under the provocative name ‘Fortibitch’, leaked the data cache believed to have been exfiltrated from the company’s Microsoft Azure Sharepoint server.
The group released credentials to an S3 storage bucket on the underground breach forum, where it claimed other cyber criminals would be able to access the stolen data.
The threat actor’s listing noted it had attempted to negotiate a ransom for the stolen information with Fortinet’s leadership, but after talks stalled it decided to leak the dataset.
It accused Fortinet of failing to file an SEC form 8-K, in which firms in the US are required to disclose major cyber incidents.
Fortinet acknowledged the incident in a statement released on 12 September, confirming there was unauthorized access to a third party storage drive.
“An individual gained unauthorized access to a limited number of files stored on Fortinet’s instance of a third-party cloud-based shared file drive, which included limited data related to a small number (less than 0.3%) of Fortinet customers.”
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
According to the dark web listing, the leaked data is said to include employee resources, finance documents, HR documents from India, product offerings, US sales data, as well as professional services and marketing documents.
Fortinet customers could be affected, but stolen information not ‘critical’
Fortinet did not confirm exactly how many customers were impacted, but based on the figure provided in its statement this could number in the tens of thousands.
The firm noted that there was no evidence the incident had resulted in any malicious activity affecting those customers, however.
It added that the company’s operations, products, and services were not impacted, largely due to the limited nature of the access gained by the threat group.
“We have not experienced, and do not currently believe that the incident is reasonably likely to have a material impact to our financial condition or operating results,” the company said in an advisory.
Fortinet immediately engaged an external forensics specialist to confirm its own findings, confirming the incident did not involve any data encryption, deployment of ransomware, or access to the firm’s corporate network.
Reporting on the incident, threat intelligence firm CloudSEK stated with “medium confidence” that the Fortibitch group is based in Ukraine.
This appears to be due to references to the Ukrainian cyber gang DC804 in its Breach Forums post, although CloudSEK admitted no direct connection has been established between the two entities.
It added Fortinet’s claims the information was not critical are likely to be true, as if it was the group would have likely tried to sell the data, rather than simply release it to the public.

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
Thousands of Fortinet's FortiGate edge devices were exposed in a Chinese-backed hacking campaign
News Fortinet’s FortiGate devices were found to be at risk of exploitation, and Dutch authorities have issued an alert to at-risk organizations
By Steve Ranger Published
-
Over 133,000 Fortinet appliances are still vulnerable to a critical flaw — here’s why you need to patch now
News Tens of thousands of Fortinet customers are still yet to patch vulnerable appliances
By Solomon Klappholz Published
-
Fortinet will want to forget last week after botched vulnerability disclosures and a war of words over an electric toothbrush caused chaos
News From hyped-up botnets to RCE flaws, Fortinet faces a PR nightmare after a week of security and disclosure blunders
By Solomon Klappholz Published
-
That electric toothbrush DDoS story you saw might have been a case of mistranslation
News The plausibility of claims originating from an interview in a Swiss newspaper have been called into question
By Ross Kelly Published