A new and sophisticated phishing campaign is targeting remote workers and IT administrators by impersonating the official Fortinet VPN download portal.
This attack is particularly dangerous because it leverages search engine optimization (SEO) and, alarmingly, AI-generated search summaries to lure victims into a trap.
The campaign utilizes a multi-stage redirect mechanism starting with trusted domains to bypass initial security filters, ultimately stealing VPN credentials and distributing malware.
Security researcher with Alias G0njxa has observed that modern search engines, which now feature AI-generated “quick answers” or summaries, are inadvertently boosting this campaign.
When users search for “How to download Fortinet VPN,” some AI summaries are scraping content from the attacker’s malicious GitHub repository (vpn-fortinet[.]github[.]io) and presenting it as a legitimate step-by-step guide.

Because the initial link is hosted on GitHub, a reputable platform, AI models and users alike are more likely to trust the source. This “hallucinated” trust leads users to click the link, initiating the attack chain.
The attack follows a clever, segmented flow designed to filter out security bots and target only real human users coming from specific search engines.

IT administrators should immediately block the following domains and investigate any internal traffic that has communicated with them.
| IoC Type | Value | Description |
|---|---|---|
| Redirect Domain | vpn-fortinet[.]github[.]io | Initial landing page hosted on GitHub Pages to evade reputation filters. |
| Phishing URL | fortinet-vpn[.]com | The destination site where credential harvesting occurs. |
| Payload Host | myfiles2[.]download | Hosting domain for the decoy or malware payload. |
Organizations must remind employees that legitimate software downloads rarely require pre-authentication credentials just to get the installer. Authenticity should always be verified by checking the URL bar for the official fortinet.com domain.
Furthermore, this campaign highlights a critical new risk: Do not blindly trust AI search summaries. While convenient, these tools ingest data from the open web and can easily be manipulated by threat actors using basic SEO tactics. Always verify the source link before clicking.