{"id":102823,"date":"2025-02-07T16:47:54","date_gmt":"2025-02-07T08:47:54","guid":{"rendered":"https:\/\/version-2.com\/?p=102823"},"modified":"2025-01-30T16:52:49","modified_gmt":"2025-01-30T08:52:49","slug":"what-msps-need-to-know-about-the-fortigate-leaked-credentials","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/02\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/","title":{"rendered":"What MSPs Need to Know About the Fortigate Leaked Credentials"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"102823\" class=\"elementor elementor-102823\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp\" width=\"1281\" height=\"720\" \/><\/p><div class=\"elementor-widget-container\"><p>A new hacking group called <strong>Belsen Group<\/strong> has dumped data containing <strong>IP addresses, firewall configurations, and plaintext VPN credentials<\/strong> from over <strong>15,000 FortiGate firewalls<\/strong>. This breach is particularly alarming for <strong>MSPs<\/strong> and <strong>IT professionals<\/strong> who rely on FortiGate firewalls to secure client environments.<\/p><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>Key Takeaways:<\/strong><\/h3><ul class=\"wp-block-list\"><li>Over <strong>54%<\/strong> of the compromised firewalls are still <strong>online and accessible<\/strong> as of January 2025.<\/li><li>The breach is linked to <strong>CVE-2022\u201340684<\/strong>, a critical <strong>authentication bypass vulnerability<\/strong> that attackers exploited to steal firewall configurations.<\/li><\/ul><p>Here\u2019s a closer look at what happened, the risks involved, and how <strong>MSPs and IT professionals<\/strong> can protect their networks.<\/p><h2>\u00a0<\/h2><h2 class=\"wp-block-heading\"><strong>Background and Timeline<\/strong><\/h2><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>Who is the Belsen Group?<\/strong><\/h3><p>A relatively new <strong>cybercriminal group<\/strong> recently leaked <strong>1.6GB of FortiGate firewall configurations<\/strong>, organized by <strong>country and IP address<\/strong>.<\/p><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>How Was the Data Obtained?<\/strong><\/h3><p>Cybersecurity researcher <strong>Kevin Beaumont<\/strong> linked this attack to <strong>CVE-2022\u201340684<\/strong>, a critical <strong>authentication bypass zero-day vulnerability<\/strong> disclosed by <strong>Fortinet<\/strong> in <strong>October 2022<\/strong>. Attackers exploited this flaw to <strong>extract configuration files<\/strong> and <strong>steal credentials<\/strong>.<\/p><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>Why Does It Matter Now?<\/strong><\/h3><p>Even though this data dates back to <strong>2022<\/strong>, <strong>firewall configurations often remain unchanged<\/strong> unless an organization has actively responded to a known breach \/ rotated login credentials. This means <strong>that credentials and firewall rules from 2022 could still be valid<\/strong>.<\/p><h2>\u00a0<\/h2><h2 class=\"wp-block-heading\"><strong>Scope of Exposure<\/strong><\/h2><h3 class=\"wp-block-heading\"><strong>Major Findings:<\/strong><\/h3><ul class=\"wp-block-list\"><li><strong>54% of the leaked IPs remain online and reachable<\/strong> (as of January 2025).<\/li><li><strong>33% of these IPs still expose FortiGate login interfaces<\/strong><\/li><li>A <strong>community-driven GitHub repository<\/strong> is tracking the leaked IPs:<br \/>\ud83d\udd17<a href=\"https:\/\/github.com\/arsolutioner\/fortigate-belsen-leak\/blob\/main\/affected_ips.txt\" target=\"_blank\" rel=\"noopener\"> Leaked IP List<\/a><\/li><\/ul><h2>\u00a0<\/h2><h2 class=\"wp-block-heading\"><strong>How to Check If You\u2019re Affected<\/strong><\/h2><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>1. Compare Your IP Addresses<\/strong><\/h3><p>Check your <strong>IP inventory<\/strong> against the leaked IP list:<br \/>\ud83d\udd17<a href=\"https:\/\/github.com\/arsolutioner\/fortigate-belsen-leak\/blob\/main\/affected_ips.txt\" target=\"_blank\" rel=\"noopener\"> Leaked IP List<\/a><\/p><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>2. Guardz Trial Users Get a Free Check<\/strong><\/h3><p>Guardz offers a <strong>free vulnerability assessment<\/strong> during its trial period. We\u2019ll check if your organization appears in the leaked data and provide <strong>Dark Web monitoring<\/strong> to detect other breaches.<\/p><h2>\u00a0<\/h2><h2 class=\"wp-block-heading\"><strong>Recommended Remediations<\/strong><\/h2><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>1. Patch &amp; Update Immediately<\/strong><\/h3><ul class=\"wp-block-list\"><li><strong>For FortiOS 7.0.x<\/strong> \u2192 Update to <strong>7.0.16+<\/strong><\/li><li><strong>For FortiOS 7.2.x<\/strong> \u2192 Update to <strong>7.2.12+<\/strong><\/li><li><strong>For CVE-2024-55591<\/strong> \u2192 Follow Fortinet\u2019s guidance to upgrade to <strong>7.0.17+ or 7.2.13+<\/strong><\/li><\/ul><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>2. Rotate Credentials<\/strong><\/h3><ul class=\"wp-block-list\"><li><strong>Immediately<\/strong> change all <strong>FortiGate passwords<\/strong>.<\/li><li>Enforce <strong>multi-factor authentication (MFA)<\/strong> on all remote-access VPNs and admin portals.<\/li><\/ul><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>3. Remove Public-Facing Admin Pages<\/strong><\/h3><ul class=\"wp-block-list\"><li>Restrict management interfaces to <strong>internal networks<\/strong> or <strong>secure VPN connections<\/strong>.<\/li><li>Exposing admin interfaces <strong>to the public internet<\/strong> makes them <strong>easy targets<\/strong> for brute-force attacks and zero-day exploits.<\/li><\/ul><h3>\u00a0<\/h3><h3 class=\"wp-block-heading\"><strong>4. Monitor for Unauthorized Activity<\/strong><\/h3><ul class=\"wp-block-list\"><li><strong>Review firewall logs<\/strong> for suspicious logins or configuration changes.<\/li><li><strong>Track inbound connections<\/strong> from unknown or suspicious IP addresses.<\/li><\/ul><h2>\u00a0<\/h2><h2 class=\"wp-block-heading\"><strong>How Guardz Supports You<\/strong><\/h2><h3 class=\"wp-block-heading\"><strong>1. Free Leak &amp; Dark Web Checks<\/strong><\/h3><p>During our trial, we scan for any <strong>leaked IPs or credentials<\/strong> associated with your organization. We also provide <strong>Dark Web monitoring<\/strong> to stay ahead of new threats.<\/p><h3 class=\"wp-block-heading\"><strong>2. Actionable Insights<\/strong><\/h3><p>Our platform offers <strong>step-by-step remediation guidance<\/strong>, including:<\/p><ul class=\"wp-block-list\"><li>Enforced <strong>password resets<\/strong>.<\/li><li>Security configuration suggestions, such as <strong>MFA enforcement<\/strong>.<\/li><\/ul><h2>\u00a0<\/h2><h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2><p>This <strong>FortiGate firewall breach<\/strong> highlights the <strong>urgent need for proactive cybersecurity measures<\/strong>. Even though this stolen data is from <strong>2022<\/strong>, many organizations <strong>haven\u2019t refreshed credentials or firewall settings<\/strong>, leaving them <strong>exposed<\/strong>.<\/p><p>If you suspect your <strong>FortiGate devices<\/strong> have been compromised\u2014or if you want expert guidance on securing your infrastructure\u2014<strong>reach out to Guardz<\/strong>.<\/p><p>We\u2019re here to help you <strong>navigate this breach, protect your assets, and keep your clients\u2019 networks secure<\/strong>.<\/p><p>\u00a0<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86d84e0 elementor-widget elementor-widget-button\" data-id=\"86d84e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/guardz.com\/distributors\/v2\/?utm_source=web&#038;utm_medium=v2sg&#038;utm_campaign=guardz&#038;utm_content=trial\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start Free Trial<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"76994\" class=\"elementor elementor-76994\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Guardz<br \/><\/strong>Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A new hacking group called Belsen Group has dumped data [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1276,1305,61],"tags":[1077,1277],"class_list":["post-102823","post","type-post","status-publish","format-standard","hentry","category-guardz","category-1305","category-press-release","tag-1077","tag-guardz"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What MSPs Need to Know About the Fortigate Leaked Credentials - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What MSPs Need to Know About the Fortigate Leaked Credentials - Version 2\" \/>\n<meta property=\"og:description\" content=\"A new hacking group called Belsen Group has dumped data [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-07T08:47:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What MSPs Need to Know About the Fortigate Leaked Credentials\",\"datePublished\":\"2025-02-07T08:47:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/\"},\"wordCount\":540,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Guardz-Threat-Report-banner.jpg.webp\",\"keywords\":[\"2025\",\"Guardz\"],\"articleSection\":[\"Guardz\",\"2025\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/\",\"url\":\"https:\\\/\\\/guardz.com\\\/blog\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/\",\"name\":\"What MSPs Need to Know About the Fortigate Leaked Credentials - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Guardz-Threat-Report-banner.jpg.webp\",\"datePublished\":\"2025-02-07T08:47:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/#primaryimage\",\"url\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Guardz-Threat-Report-banner.jpg.webp\",\"contentUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Guardz-Threat-Report-banner.jpg.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What MSPs Need to Know About the Fortigate Leaked Credentials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What MSPs Need to Know About the Fortigate Leaked Credentials - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/","og_locale":"zh_HK","og_type":"article","og_title":"What MSPs Need to Know About the Fortigate Leaked Credentials - Version 2","og_description":"A new hacking group called Belsen Group has dumped data [&hellip;]","og_url":"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/","og_site_name":"Version 2","article_published_time":"2025-02-07T08:47:54+00:00","og_image":[{"url":"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/02\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What MSPs Need to Know About the Fortigate Leaked Credentials","datePublished":"2025-02-07T08:47:54+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/02\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/"},"wordCount":540,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/#primaryimage"},"thumbnailUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp","keywords":["2025","Guardz"],"articleSection":["Guardz","2025","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/02\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/","url":"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/","name":"What MSPs Need to Know About the Fortigate Leaked Credentials - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/#primaryimage"},"image":{"@id":"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/#primaryimage"},"thumbnailUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp","datePublished":"2025-02-07T08:47:54+00:00","breadcrumb":{"@id":"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/#primaryimage","url":"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp","contentUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2024\/09\/Guardz-Threat-Report-banner.jpg.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/guardz.com\/blog\/what-msps-need-to-know-about-the-fortigate-leaked-credentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What MSPs Need to Know About the Fortigate Leaked Credentials"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qKr","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=102823"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102823\/revisions"}],"predecessor-version":[{"id":102830,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102823\/revisions\/102830"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=102823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=102823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=102823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}