Threat Intelligence

Brute-Force Attacks Surge from Middle East on Firewalls

Why are hackers pounding firewalls from the Middle East right now? A sharp brute-force surge on SonicWall and Fortinet devices signals deeper geopolitical rifts bleeding into corporate networks.

Graph showing surge in brute-force attacks from Middle East on firewall devices

Key Takeaways

  • 88% of brute-force attacks on SonicWall/Fortinet from Middle East IPs amid US-Iran tensions.
  • ClickFix social engineering tricks users into running malicious scripts themselves, evading AV.
  • Enforce MFA, strong passwords, and monitor logins to block perimeter breaches.

What if your firewall’s login screen is the new front line in a shadow war?

Researchers at Barracuda just dropped a bombshell: brute-force attacks on SonicWall and Fortinet gear spiked hard, with 88% tracing back to Middle East IP addresses. It’s not some random blip. This surge — from February to March — hit perimeter devices that guard your entire network, those internet-facing VPNs and firewalls ripe for a foothold inside.

And here’s the kicker. Over half (56%) of confirmed incidents in that window? Pure brute-force hammering weak credentials. Attackers scan, test, probe — relentlessly. Most failed, sure, blocked by tools or aimed at ghost usernames. But persistence like this? It’s a numbers game. One slip, and they’re in.

“Attackers are aggressively scanning and testing perimeter devices for weak or exposed credentials,” warned Barracuda senior cybersecurity analyst, Laila Mubashar. “Even when attacks fail, persistent probing raises the risk that a single weak password or misconfiguration could lead to compromise.”

Look, this isn’t paranoia. Edge devices have been hacker catnip forever — think SolarWinds or Log4Shell, but slower, stupider. Brute-force feels low-rent next to zero-days. Yet it’s effective. Why? Architecture. These boxes sit exposed, often with factory-default creds or lazy password policies. Corporate IT rushes deployments, skips MFA, and boom — invitation sent.

Why the Middle East Hotspot Now?

Timing screams geopolitics. US and Israeli strikes on Iran? Check. Iranian-linked crews raiding US infrastructure and medtech? Double check. Reports pile up: state-backed ops blending with ransomware crews like the revived Pay2Key. That line between nation-state fury and profit-driven crime? Blurry as hell.

But wait — IPs don’t prove squat. Attacks could proxy through regional servers, masking true origins. Still, 88%? That’s no coincidence. Remember Stuxnet, 2010? US-Israel cyber ops shredded Iran’s nukes via insider access. Now the pendulum swings. Tit-for-tat, but distributed. My unique take: this mirrors the 2008 Russia-Georgia war, where crude DDoSes from Moscow IPs overwhelmed Tbilisi’s nets. Not elegant. Devastating. Prediction? If tensions escalate, we’ll see brute-force evolve — botnets swelling, ML guessing passwords faster. Firewalls won’t just leak; they’ll flood.

Barracuda’s not mincing words. Enforce strong, unique passwords. Slap MFA on every VPN, firewall, remote service. Watch failed logins like a hawk. Lock management to trusted IPs. Basic? Yes. Done? Rarely.

Short para for punch: ClickFix is worse.

What Are ClickFix Attacks—and Why Do They Bypass Everything?

Social engineering’s ugly cousin. Scammers spoof pop-ups: “Your PC’s broken—run this fix!” Victims copy-paste malicious scripts into PowerShell or command line. Trust and panic do the rest. No phishing link to block. You’re the vector.

“The attackers use familiar elements and language such as pop-ups, prompts and running a fix,” Mubashar added. “Because ClickFix attacks rely on duping users into adding malicious commands themselves, such attacks are harder for automated security systems to spot.”

How? Architecture again. Modern EDR spots downloads, exploits. But self-inflicted scripts? Clean. Users feel smart “fixing” it themselves. Surge here too — Barracuda’s red flag. Fix: Train users (yawn, but vital). Lock down PowerShell execution. Monitor odd behaviors — anomalous processes, command-line spikes.

Here’s the deeper why. Perimeter defenses ossified. Firewalls from the 2010s, bolted onto cloud hybrids. Brute-force exploits static creds; ClickFix games human wetware. Both reveal the shift: attacks aren’t breaking in. They’re walking.

Corporate spin? Vendors like SonicWall patch frantically — good. But Barracuda’s report calls BS on complacency. “Sharp rise” isn’t hype; it’s data. My critique: Too much focus on nation-states distracts from the real grind — opportunistic crews riding coattails. Iran’s flag or not, your weak password doesn’t care.

Wander a sec: Think enterprise sprawl. Remote work exploded; VPNs multiplied. Each a potential door. Brute-force scales cheap — script-kiddie stuff. Middle East IPs? Could be Lebanese script farms, Iranian proxies, or UAE opportunists. Doesn’t matter. The ‘how’ is distributed scans via Shodan-like tools, hitting thousands per hour.

Bold prediction. By Q3, we’ll log brute-force as a service on dark web markets, priced like DDoS gigs. Geopolitics juices demand; crime supplies.

Train harder. Segment nets. Zero-trust it. Or watch the surge become the breach.

How Can Companies Stop Brute-Force Attacks Today?

MFA everywhere. Now. Rotate creds. Log everything. Tools like fail2ban on steroids.

ClickFix? Simulate attacks in training. Make users hate pop-ups.

This isn’t abstract. It’s your edge crumbling.

**


🧬 Related Insights

Frequently Asked Questions**

What are brute-force attacks on firewalls?

Hackers guess passwords repeatedly on login pages of devices like SonicWall and Fortinet VPNs, aiming for network access. Most fail but probe for weaknesses.

Are Middle East brute-force attacks linked to Iran?

88% of IPs trace there amid US-Iran tensions, but could be proxies. Timing suggests geopolitical motive mixed with crime.

How do I protect against ClickFix scams?

Educate users on fake “fixes,” restrict script execution, and monitor command-line anomalies with EDR tools.

Wei Chen
Written by

Technical security analyst. Specialises in malware reverse engineering, APT campaigns, and incident response.

Frequently asked questions

What are brute-force attacks on firewalls?
Hackers guess passwords repeatedly on login pages of devices like SonicWall and Fortinet VPNs, aiming for network access. Most fail but probe for weaknesses.
Are Middle East brute-force attacks linked to Iran?
88% of IPs trace there amid US-Iran tensions, but could be proxies. Timing suggests geopolitical motive mixed with crime.
How do I protect against ClickFix scams?
Educate users on fake "fixes," restrict script execution, and monitor command-line anomalies with EDR tools.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by InfoSecurity Magazine

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.