Exposed KeyPlug Malware Staging Server Contains Fortinet Firewall and VPN Exploitation Scripts

The sophisticated threat actors, a briefly misconfigured directory on infrastructure associated with the KeyPlug malware provided an unprecedented view into the adversary’s toolkit and workflow.

The staging server, active for less than 24 hours, exposed a collection of advanced scripts and utilities targeting Fortinet firewalls and VPN solutions, alongside reconnaissance and post-exploitation payloads.

This infrastructure has been tied to the RedGolf threat group, widely overlapped with activity ascribed to APT41, a known Chinese cyber-espionage cluster.

Infrastructure Discovery and Attribution

The exposed server, pinpointed at IP 154.31.217[.]200:443, was identified and publicized by a threat researcher on X (formerly Twitter), with evidence linking it via TLS certificate reuse to other Vultr-hosted staging systems.

VPN Exploitation
 files downloaded in AttackCapture™ from the exposed server.

Notably, this infrastructure surfaced several times within one day, reflecting observed behavior in RedGolf-linked operations.

The certificate details and server behaviors highlighted a coordinated campaign making heavy use of temporary, rapidly redeployed hosts.

A major focus of the recovered toolset was reconnaissance and enumeration of enterprise authentication portals.

The staging server housed files such as alive_urls_20250305_090959.txt and script.py, which actively scanned login, development, and identity management surfaces with targets including domains belonging to a major Japanese multinational, Shiseido.

Notably, the actors used CDN fingerprinting to isolate origin-facing assets, potentially exposing systems not protected by edge mitigation services.

Fortinet Exploitation Toolkit

Multiple bespoke scripts for Fortinet technology exploitation were found.

The reconnaissance script (1.py) automated scans for Fortinet SSL VPN portals, extracting version-specific JavaScript hashes to fingerprint appliance versions and flag vulnerable systems.

Further, files such as ws_test.py implemented exploitation of WebSocket-based CLI vulnerabilities (CVE-2024-23108 and CVE-2024-23109), automating privileged command execution on FortiOS devices through crafted unauthenticated requests.

The exposed directory also included several post-access tools, notably a sophisticated PHP-based webshell (bx.php) using AES and XOR encryption to evade detection while enabling remote command execution directly from encrypted POST payloads.

VPN Exploitation
 bx.php script contents.

For session management and persistence, a PowerShell reverse shell (client.ps1) and an ELF-based HTTP listener (Server) were present, each using encryption for communication and supporting interactive operator control.

According to the Hunt Report, this brief period of exposure yielded a rare, comprehensive picture of attack preparation, including reconnaissance, exploitation, and remote access maintenance stages.

It underscores the operational tempo and segmentation of modern nation-state-aligned adversaries, as well as the ongoing targeting of VPN and firewall appliances.

The highly transient nature of the infrastructure a tactic to avoid detection complicates defense, highlighting the necessity for continual monitoring of external service footprints, rapid patching, and log analysis focused on webshell indicators and anomalous authentication attempts.

This exposure offers security teams actionable intelligence for detection and immediate defensive posture adjustments, particularly for organizations leveraging Fortinet security appliances and with a global online presence.

Indicators of Compromise (IOCs)

FilenameSHA-256 HashDescription
systemed-dev53a24e00ae671879ea3677a29ee1b10706aa5aa0dccd4697c3a94ee05df2ec45Malicious ELF backdoor
1.py09b220a315ea0aebae2de835a3240d3690c962a3c801dd1c1cf6e6e2c84ede95Fortinet recon script
bx.php7146774db3c77e27b7eb48745aef56b50e0e7d87280fea03fa6890646af50d50PHP encrypted webshell
client.ps1c8d2b2ba5b6585584200ca46564b47db8048d748aefbdfe537bceaf27fb93ad7PowerShell reverse shell
script.py2386baf4bf3a57ae7bca44c952855a98edf569da7b62bb0c8cbe414f1800d2b6CDN fingerprinting, domain targeting
Serverf21a7180405c52565fdc7a81b2fb5a494a3d936a25d1b30b9bd4b69a5e1de9a3Linux-based HTTP listener/controller
ws_test.py98261d1f92ae8f7a479bc5fc4d0a8d6a76c0d534e63e9edbc2d6257a9ba84b9dFortinet WebSocket exploit script
fscane82ecbe3823046a27d8c39cc0a4acb498f415549946c9ff0e241838b34ed5a21Port scanner utility

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here