belsen zerosevengroup cybersecurity conspiracy

While cybersecurity experts were busy patching last year’s vulnerabilities, two hacking groups quietly emerged from Yemen with an appetite for corporate data.

The Belsen Group burst onto the scene in January 2025, immediately flexing their muscles by leaking 1.6 GB of data from over 15,000 FortiGate devices. Not exactly subtle. They exploited CVE-2022-40684 in FortiOS and, in a classic “first taste is free” move, shared the data gratis to build street cred before shifting to selling network access. The group established a strong online presence with accounts on Tox, XMPP, Telegram and other platforms to maintain communication with potential buyers.

The Belsen Group didn’t just enter—they kicked down the door, announcing themselves with 15,000 compromised devices and zero subtlety.

Meanwhile, ZeroSevenGroup has been lurking around since July 2024. They’ve been busy too, targeting companies across Poland, Israel, USA, UAE, Russia, and Brazil. They even claimed to have breached Toyota’s US branch. Ambitious folks. They’ve also managed to tick off the Medusa Ransomware group, who accused them of scamming. Honor among thieves? Not so much.

The similarities between these groups are striking. Like, suspiciously striking. Both sell network access, write in the same style, and use identical “[ Access ] To…” title formats. They both claim Yemen origins and incorporate “group” into their usernames. Coincidence? KELA doesn’t think so.

Their exploitation techniques aren’t exactly revolutionary. Belsen hammered FortiGate firewalls while ZeroSevenGroup broke into multiple corporate databases. The results, however, are devastating. These attacks demonstrate why multi-factor authentication has become essential for protecting sensitive systems from unauthorized access.

The leak of 15,000+ FortiGate configurations exposed VPN credentials and firewall rules affecting government, healthcare, and financial sectors globally. Countries hit hardest include the US, UK, Poland, and Belgium. The most significant concentration of compromised devices was identified in Mexico and Thailand, creating particular concern for organizations in these regions.

The aftermath? A global scramble to update credentials, reconfigure firewalls, and rotate compromised certificates.

Are these groups working together? Probably. The evidence points to either direct collaboration or a shared template for their operations.

Either way, they’ve successfully carved out their niche in cybercrime’s ecosystem. And while security teams worldwide panic and patch, these groups are likely already eyeing their next target. Business as usual in the digital underworld.

You May Also Like

Over One Million PCs Compromised by Alarming Malvertising Wave

Millions of PCs hijacked through illegal streaming sites as criminals exploit trusted platforms like GitHub. The attack chain captures banking data and personal credentials. Your free stream might cost everything.

How TsarBot Stealthily Targets 750 Financial Apps to Steal Credentials

TsarBot: The Russian-built shadow lurking beneath 750 financial apps, silently swiping credentials while you type. Your banking pattern isn’t as secure as you think.

Rhysida Strikes Again: Over 300K Patients’ Data Stolen From Two US Healthcare Organizations

Rhysida ransomware gang plunders 300K+ patient records while hospitals resort to pen and paper. Your medical secrets could be next on the dark web auction block.

How a Deceptive Email Pretends You’re Upgrading Your Coinbase Wallet

Learn how scammers hijack your crypto with an innocent-looking Coinbase email. The sinister twist? They trick you into importing their recovery phrase, handing over your wallet keys. Your funds vanish instantly.