belsen zerosevengroup cybersecurity conspiracy

While cybersecurity experts were busy patching last year’s vulnerabilities, two hacking groups quietly emerged from Yemen with an appetite for corporate data.

The Belsen Group burst onto the scene in January 2025, immediately flexing their muscles by leaking 1.6 GB of data from over 15,000 FortiGate devices. Not exactly subtle. They exploited CVE-2022-40684 in FortiOS and, in a classic “first taste is free” move, shared the data gratis to build street cred before shifting to selling network access. The group established a strong online presence with accounts on Tox, XMPP, Telegram and other platforms to maintain communication with potential buyers.

The Belsen Group didn’t just enter—they kicked down the door, announcing themselves with 15,000 compromised devices and zero subtlety.

Meanwhile, ZeroSevenGroup has been lurking around since July 2024. They’ve been busy too, targeting companies across Poland, Israel, USA, UAE, Russia, and Brazil. They even claimed to have breached Toyota’s US branch. Ambitious folks. They’ve also managed to tick off the Medusa Ransomware group, who accused them of scamming. Honor among thieves? Not so much.

The similarities between these groups are striking. Like, suspiciously striking. Both sell network access, write in the same style, and use identical “[ Access ] To…” title formats. They both claim Yemen origins and incorporate “group” into their usernames. Coincidence? KELA doesn’t think so.

Their exploitation techniques aren’t exactly revolutionary. Belsen hammered FortiGate firewalls while ZeroSevenGroup broke into multiple corporate databases. The results, however, are devastating. These attacks demonstrate why multi-factor authentication has become essential for protecting sensitive systems from unauthorized access.

The leak of 15,000+ FortiGate configurations exposed VPN credentials and firewall rules affecting government, healthcare, and financial sectors globally. Countries hit hardest include the US, UK, Poland, and Belgium. The most significant concentration of compromised devices was identified in Mexico and Thailand, creating particular concern for organizations in these regions.

The aftermath? A global scramble to update credentials, reconfigure firewalls, and rotate compromised certificates.

Are these groups working together? Probably. The evidence points to either direct collaboration or a shared template for their operations.

Either way, they’ve successfully carved out their niche in cybercrime’s ecosystem. And while security teams worldwide panic and patch, these groups are likely already eyeing their next target. Business as usual in the digital underworld.

You May Also Like

How TsarBot Stealthily Targets 750 Financial Apps to Steal Credentials

TsarBot: The Russian-built shadow lurking beneath 750 financial apps, silently swiping credentials while you type. Your banking pattern isn’t as secure as you think.

Stunning Cyberheist: StubHub’s Backdoor Exposed as Thieves Steal Taylor Swift’s Concert Tickets

Taylor Swift’s tickets vanished into thin air as StubHub’s backdoor enabled thieves to pocket $635,000. Two suspects face 15-year sentences while Swifties worry if their tickets are next.

Legitimate RMM Tools: The Surprising New Weapon in Cyberattacks

Legitimate IT tools are now hackers’ favorite weapons, bypassing security with shocking ease. Why are criminals abandoning traditional malware for software your company already trusts? Your defense strategy might be obsolete.

FTC Distributes $25.5 Million to Scammed Victims: A Bold Stand Against Tech Support Fraud

The FTC just handed back $25.5 million to tech support scam victims while fraudsters’ assets freeze. Seniors were ruthlessly targeted with fake virus alerts and hefty charges. Learn how they’re fighting back.