AI-Powered Hackers Crack 600 Firewalls While iOS Spyware Goes Full Stealth Mode

Page content

AI-Powered Hackers Crack 600 Firewalls While iOS Spyware Goes Full Stealth Mode

I’ve been digging through this week’s security news, and honestly, it feels like we’re watching the threat landscape shift in real time. Two stories in particular caught my attention because they represent exactly the kind of sophisticated attacks we’ve been warning about – and they’re happening right now.

When AI Becomes the Hacker’s Best Friend

Let’s start with what Amazon’s threat intelligence team uncovered: a Russian-speaking threat actor who managed to compromise over 600 FortiGate devices across 55 countries in just five weeks. What makes this particularly interesting isn’t just the scale – it’s how they did it.

According to Amazon’s research, this wasn’t your typical script kiddie operation. The attacker was actively using multiple commercial generative AI services to enhance their campaign. We’re talking about AI helping with everything from reconnaissance to payload development.

This is the kind of force multiplier effect we’ve been discussing in security circles for months. When you can offload research, code generation, and even social engineering to AI tools, suddenly a single threat actor can operate at the scale of what used to require entire teams. The fact that they hit 55 countries in five weeks tells you everything you need to know about this new operational tempo.

What’s particularly concerning is that these weren’t zero-day exploits. The Hacker News reports indicate this was likely exploitation of known vulnerabilities, which means organizations had patches available but hadn’t applied them. It’s a stark reminder that even the most sophisticated AI-assisted attacks often succeed through basic security hygiene failures.

iOS Spyware Gets Disturbingly Good at Hiding

While we’re talking about sophisticated attacks, let’s discuss something that should make every iPhone user uncomfortable. Intellexa’s Predator spyware has evolved to the point where it can completely hide iOS recording indicators while streaming your camera and microphone feeds to operators.

BleepingComputer’s analysis shows that Predator hooks directly into iOS SpringBoard – essentially the core interface system – to suppress those little orange and green dots that normally tell you when apps are accessing your camera or microphone. This isn’t just disabling a notification; it’s surgically removing your ability to detect surveillance.

What makes this particularly nasty is how it breaks the fundamental trust model that Apple has built around iOS privacy indicators. Most users have learned to look for those dots as their primary defense against unauthorized recording. When that defense is silently removed, people lose their most basic awareness of potential surveillance.

The technical sophistication here is impressive in the worst possible way. Hooking SpringBoard requires deep iOS internals knowledge and suggests this spyware has access to capabilities that go well beyond what typical malware can achieve. We’re likely looking at nation-state level tooling, which raises serious questions about who has access to Predator and how it’s being deployed.

Don’t Forget the Fundamentals

While these advanced threats grab headlines, we can’t lose sight of the basics. There’s also a critical vulnerability in Grandstream phones (CVE-2026-2329) that allows unauthenticated remote code execution with root privileges. SecurityWeek reports this could expose voice calls to interception – a reminder that our communication infrastructure often has significant security gaps.

This is exactly the kind of vulnerability that gets overlooked while we’re focused on AI-powered attacks and sophisticated spyware. But for an attacker, the path of least resistance often involves exploiting these fundamental flaws rather than deploying cutting-edge techniques.

What This Means for Our Defense Strategies

Looking at these incidents together, I see a clear pattern: attackers are getting better at both scale and stealth. The FortiGate campaign shows how AI can amplify an individual threat actor’s capabilities to enterprise-threatening levels. The Predator spyware evolution demonstrates how even our most trusted security indicators can be subverted.

Our response needs to match this sophistication. We can’t rely solely on traditional indicators and basic patch management anymore. The AI-assisted FortiGate attacks succeeded partly because organizations hadn’t applied available patches, but they also succeeded because the attacker could operate at a pace that outstripped many organizations’ ability to respond.

For mobile security, the Predator developments suggest we need to think beyond user education about privacy indicators. When those indicators can be silently disabled, we need deeper behavioral analysis and network-level monitoring to detect potential surveillance.

The reality is that both human attackers and their AI assistants are getting more capable every month. Our defense strategies need to evolve just as quickly, and that means investing in both advanced detection capabilities and the fundamentals of security hygiene.

Sources