The sophisticated threat actors, a briefly misconfigured directory on infrastructure associated with the KeyPlug malware provided an unprecedented view into the adversary’s toolkit and workflow.
The staging server, active for less than 24 hours, exposed a collection of advanced scripts and utilities targeting Fortinet firewalls and VPN solutions, alongside reconnaissance and post-exploitation payloads.
This infrastructure has been tied to the RedGolf threat group, widely overlapped with activity ascribed to APT41, a known Chinese cyber-espionage cluster.
Infrastructure Discovery and Attribution
The exposed server, pinpointed at IP 154.31.217[.]200:443, was identified and publicized by a threat researcher on X (formerly Twitter), with evidence linking it via TLS certificate reuse to other Vultr-hosted staging systems.

Notably, this infrastructure surfaced several times within one day, reflecting observed behavior in RedGolf-linked operations.
The certificate details and server behaviors highlighted a coordinated campaign making heavy use of temporary, rapidly redeployed hosts.
A major focus of the recovered toolset was reconnaissance and enumeration of enterprise authentication portals.
The staging server housed files such as alive_urls_20250305_090959.txt
and script.py
, which actively scanned login, development, and identity management surfaces with targets including domains belonging to a major Japanese multinational, Shiseido.
Notably, the actors used CDN fingerprinting to isolate origin-facing assets, potentially exposing systems not protected by edge mitigation services.
Fortinet Exploitation Toolkit
Multiple bespoke scripts for Fortinet technology exploitation were found.
The reconnaissance script (1.py
) automated scans for Fortinet SSL VPN portals, extracting version-specific JavaScript hashes to fingerprint appliance versions and flag vulnerable systems.
Further, files such as ws_test.py
implemented exploitation of WebSocket-based CLI vulnerabilities (CVE-2024-23108 and CVE-2024-23109), automating privileged command execution on FortiOS devices through crafted unauthenticated requests.
The exposed directory also included several post-access tools, notably a sophisticated PHP-based webshell (bx.php
) using AES and XOR encryption to evade detection while enabling remote command execution directly from encrypted POST payloads.

For session management and persistence, a PowerShell reverse shell (client.ps1
) and an ELF-based HTTP listener (Server
) were present, each using encryption for communication and supporting interactive operator control.
According to the Hunt Report, this brief period of exposure yielded a rare, comprehensive picture of attack preparation, including reconnaissance, exploitation, and remote access maintenance stages.
It underscores the operational tempo and segmentation of modern nation-state-aligned adversaries, as well as the ongoing targeting of VPN and firewall appliances.
The highly transient nature of the infrastructure a tactic to avoid detection complicates defense, highlighting the necessity for continual monitoring of external service footprints, rapid patching, and log analysis focused on webshell indicators and anomalous authentication attempts.
This exposure offers security teams actionable intelligence for detection and immediate defensive posture adjustments, particularly for organizations leveraging Fortinet security appliances and with a global online presence.
Indicators of Compromise (IOCs)
Filename | SHA-256 Hash | Description |
---|---|---|
systemed-dev | 53a24e00ae671879ea3677a29ee1b10706aa5aa0dccd4697c3a94ee05df2ec45 | Malicious ELF backdoor |
1.py | 09b220a315ea0aebae2de835a3240d3690c962a3c801dd1c1cf6e6e2c84ede95 | Fortinet recon script |
bx.php | 7146774db3c77e27b7eb48745aef56b50e0e7d87280fea03fa6890646af50d50 | PHP encrypted webshell |
client.ps1 | c8d2b2ba5b6585584200ca46564b47db8048d748aefbdfe537bceaf27fb93ad7 | PowerShell reverse shell |
script.py | 2386baf4bf3a57ae7bca44c952855a98edf569da7b62bb0c8cbe414f1800d2b6 | CDN fingerprinting, domain targeting |
Server | f21a7180405c52565fdc7a81b2fb5a494a3d936a25d1b30b9bd4b69a5e1de9a3 | Linux-based HTTP listener/controller |
ws_test.py | 98261d1f92ae8f7a479bc5fc4d0a8d6a76c0d534e63e9edbc2d6257a9ba84b9d | Fortinet WebSocket exploit script |
fscan | e82ecbe3823046a27d8c39cc0a4acb498f415549946c9ff0e241838b34ed5a21 | Port scanner utility |
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates