Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

AXA XL Unveils Dedicated Team for Alternative Risk Solutions

February 1, 2026

Guarding the Future: Securing AI Application Supply Chains

January 31, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » New Sicarii RaaS Operation Targets RDP and Fortinet Devices
Cybercrime and Ransomware

New Sicarii RaaS Operation Targets RDP and Fortinet Devices

Staff WriterBy Staff WriterJanuary 15, 2026No Comments4 Mins Read1 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Fast Facts

  1. In December 2025, the Sicarii ransomware operation emerged as a uniquely ideological group with Israeli/Jewish affiliations, openly displaying Hebrew language and symbols like Haganah.
  2. Unlike typical cybercriminal groups, Sicarii targets organizations in Arab and Muslim countries, employing geo-fencing to exclude Israeli systems and using sophisticated infrastructure for stealth and resilience.
  3. The malware performs network reconnaissance, exploits vulnerabilities like CVE-2025-64446 on Fortinet devices, and exfiltrates extensive data—including credentials and chat info—before encrypting files with AES-GCM and deploying destructive bootloader corruption.
  4. Organizations should focus on patching Fortinet devices, implementing network segmentation, and monitoring for zero-day exploits to defend against this politically motivated and technically advanced ransomware threat.

The Issue

In December 2025, a new ransomware-as-a-service operation called Sicarii emerged on underground platforms. Unlike typical cybercriminal groups, Sicarii explicitly displayed Hebrew language, Israeli symbols, and references to Jewish history. This operation openly identified itself with the Haganah symbol and aimed its attacks at organizations in Arab and Muslim countries, deliberately avoiding Israeli systems. Using sophisticated methods, the malware employed geo-fencing techniques to detect Israeli targets—checking time zones, keyboard layouts, and network IPs—thus ensuring only non-Israeli systems were attacked. Once active, the ransomware conducted network reconnaissance, scanned for exposed RDP services, and exploited known vulnerabilities in Fortinet devices to move laterally within networks. It collected sensitive data from various platforms, encrypted files with AES-256, and then exfiltrated the data before deploying destructive scripts that damaged critical system components. Security analysts from Check Point identified this operation’s complex infrastructure and warned organizations to patch vulnerabilities and implement network segmentation to defend against such targeted offensive cyber activity.

Risk Summary

The issue titled “New Sicarii RaaS Operation Attacks Exposed RDP Services and Attempts to Exploit Fortinet Devices” poses a serious threat to any business because cybercriminals target remote desktop protocol (RDP) services, which are common access points for employees and IT teams. When these services are exposed without proper protections, hackers can gain unauthorized access, leading to data breaches and operational disruptions. Moreover, attempts to exploit vulnerabilities in Fortinet devices—widely used for network security—can result in unauthorized control over critical systems. Consequently, businesses face severe consequences, including financial loss, reputational damage, and legal liabilities. Therefore, understanding and proactively addressing these vulnerabilities is essential to safeguard your business’s infrastructure and maintain trust with clients and partners.

Possible Action Plan

In the rapidly evolving landscape of cybersecurity threats, swift and effective remediation is crucial to minimize damage and prevent future breaches. When attackers target exposed RDP services and attempt to exploit vulnerabilities in Fortinet devices, prompt action is essential to contain the threat, protect sensitive data, and maintain organizational resilience.

Containment Strategies

  • Isolate affected systems from the network to prevent lateral movement.
  • Disable or change compromised accounts and credentials immediately.

Vulnerability Patching

  • Apply the latest security patches for RDP services and Fortinet devices.
  • Regularly update firmware and software to fix known vulnerabilities.

Access Control

  • Implement strong, multi-factor authentication for remote access.
  • Restrict RDP access to only necessary IP addresses and protocols.

Monitoring & Detection

  • Enable comprehensive logging on RDP and Fortinet devices.
  • Use intrusion detection systems to identify malicious activity early.

Communication & Reporting

  • Notify relevant internal teams and external authorities as required.
  • Document the incident and remediation efforts for analysis and compliance.

Security Enhancements

  • Deploy VPNs or bastion hosts to secure remote connections.
  • Consider deploying Web Application Firewalls or other protective measures around vulnerable endpoints.

Acting quickly with these mitigations helps secure organizational assets, reduce risk exposure, and strengthen defenses against ongoing and future attacks.

Continue Your Cyber Journey

Stay informed on the latest Threat Intelligence and Cyberattacks.

Explore engineering-led approaches to digital security at IEEE Cybersecurity.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1cyberattack-v1-multisource

CISO Update cyber risk cybercrime Cybersecurity MX1 risk management
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGlobal Ransomware Surge: Manufacturers Hit Hardest in 2025
Next Article New York: Craft Your AI Strategy with Microsoft Marketplace Solutions
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

Guarding the Future: Securing AI Application Supply Chains

January 31, 2026

Startup Unveils Linux Security Overhaul to Halt Hackers

January 30, 2026

Comments are closed.

Latest Posts

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

Startup Unveils Linux Security Overhaul to Halt Hackers

January 30, 2026

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 2026

AI’s Rapid Rise in Detecting and Exploiting Security Flaws

January 30, 2026
Don't Miss

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

By Staff WriterFebruary 1, 2026

Summary Points AI is primarily used to accelerate human-driven cyber activities like reconnaissance, phishing, and…

Guarding the Future: Securing AI Application Supply Chains

January 31, 2026

Startup Unveils Linux Security Overhaul to Halt Hackers

January 30, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges
  • AXA XL Unveils Dedicated Team for Alternative Risk Solutions
  • Guarding the Future: Securing AI Application Supply Chains
  • Alles Technology Unveils Game-Changing Tabletop Service for Cyber Readiness
  • Torq Elevates SOCs with AI-Driven Hyper Automation
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

AI Fuels Surge in Industrial Cyber Threats, Redefining OT Defense Challenges

February 1, 2026

AXA XL Unveils Dedicated Team for Alternative Risk Solutions

February 1, 2026

Guarding the Future: Securing AI Application Supply Chains

January 31, 2026
Most Popular

Nokia Alerts Telecoms to Rising Stealth Attacks, DDoS Surge, and Cryptography Pressures

October 8, 20259 Views

Cyberattack Cripples 34 Devices in Telecoms Using LinkedIn Lures & MINIBIKE Malware

September 19, 20259 Views

Tonic Security Secures $7 Million to Transform Cyber Risk Reduction

July 28, 20259 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.