KeyPlug-Linked Server Exposes Fortinet Exploits & Webshell Activity Targeting a Major Japanese Company
A KeyPlug-linked server briefly exposed a collection of Fortinet firewall and VPN exploit scripts, PHP webshells, and network reconnaissance tools targeting a major Japanese company. This exposure revealed the attacker’s operational workflow, including infrastructure reconnaissance and post-access session management, providing rare insight into an advanced adversary’s tactics. The threat involves exploitation of Fortinet vulnerabilities, notably CVE-2024-23108 and CVE-2024-23109, though no active widespread exploitation has been confirmed. The attacker group identified is RedGolf, known for targeted intrusions. The exposure was short-lived but highlights the risk of Fortinet device exploitation and subsequent internal network compromise. European organizations using Fortinet products could be at risk if targeted by similar campaigns. Mitigation requires immediate patching of Fortinet vulnerabilities, enhanced monitoring for webshell activity, and restricting access to internal portals. Countries with significant Fortinet deployments and strategic sectors similar to the Japanese target are most likely affected. The threat is assessed as high severity due to the potential for unauthorized access, lateral movement, and data compromise without requiring user interaction. Defenders should prioritize Fortinet patch management and network segmentation to reduce exposure.
AI Analysis
Technical Summary
The threat centers on a server linked to the KeyPlug malware infrastructure that was briefly exposed, revealing a suite of tools used in active cyber operations against a major Japanese company. The exposed tools included exploit scripts targeting Fortinet firewall and VPN vulnerabilities, specifically CVE-2024-23108 and CVE-2024-23109, which allow attackers to bypass authentication or execute arbitrary code. Additionally, PHP webshells were found, enabling persistent remote access and command execution within the victim’s network. The server also contained network reconnaissance utilities designed to fingerprint content delivery networks (CDNs) and probe authentication portals, indicating a methodical approach to internal network mapping and session management post-compromise. The adversary behind this activity is identified as RedGolf, a group known for sophisticated targeted attacks. Although the exposure lasted less than a day and no widespread exploitation is currently confirmed, the incident provides valuable insight into the attacker’s workflow from initial reconnaissance to maintaining access. The presence of encrypted command execution tools suggests attempts to evade detection and maintain stealth. This threat highlights the ongoing risk posed by unpatched Fortinet devices, which are widely used globally, including in Europe, for firewall and VPN services. The operational details exposed underscore the importance of continuous monitoring and rapid patch deployment to defend against advanced persistent threats leveraging such vulnerabilities.
Potential Impact
For European organizations, the exploitation of Fortinet firewall and VPN vulnerabilities could lead to unauthorized network access, data exfiltration, and disruption of critical services. Given Fortinet’s significant market share in Europe’s enterprise and government sectors, successful exploitation could compromise sensitive information and internal systems. The use of webshells and encrypted command utilities enables attackers to maintain persistence and move laterally within networks, increasing the risk of widespread compromise. Organizations in sectors such as finance, telecommunications, and critical infrastructure are particularly at risk due to their reliance on Fortinet products and the strategic value of their data. The exposure of internal portals and authentication mechanisms could facilitate credential theft and privilege escalation. Although no active widespread exploitation is confirmed, the demonstrated attacker capabilities and tooling suggest a high potential impact if leveraged in targeted campaigns against European entities. The incident also raises concerns about supply chain and third-party risk, as attackers may target partners or vendors using similar infrastructure.
Mitigation Recommendations
European organizations should immediately verify and apply patches for Fortinet vulnerabilities CVE-2024-23108 and CVE-2024-23109 to close known exploit vectors. Conduct comprehensive network scans to detect any signs of webshells or unauthorized scripts, focusing on internal portals and authentication systems. Implement strict network segmentation to limit lateral movement opportunities for attackers who gain initial access. Enhance logging and monitoring for unusual command execution patterns, especially encrypted or obfuscated traffic indicative of command and control activity. Restrict access to Fortinet management interfaces using multi-factor authentication and IP whitelisting. Regularly audit and update VPN configurations to ensure secure authentication and session management. Employ threat hunting exercises to identify any indicators of compromise related to KeyPlug or RedGolf activity. Collaborate with threat intelligence providers to stay informed about emerging tactics and indicators. Finally, conduct targeted user awareness training on phishing and social engineering, as initial access vectors may involve credential compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
Indicators of Compromise
- cve: CVE-2024-23108
- cve: CVE-2024-23109
- hash: 71842588ace7442bee095dab2782f253
- hash: 90a7fa13f9fad5626d166ef3c0e14c0d
- hash: 1567b74dfcdf7c4c2454f2b84ecee915d9bb3f11
- hash: 6b325f1cd5626d15c10b45793ffe88edf4ca07a9
- hash: 09b220a315ea0aebae2de835a3240d3690c962a3c801dd1c1cf6e6e2c84ede95
- hash: 2386baf4bf3a57ae7bca44c952855a98edf569da7b62bb0c8cbe414f1800d2b6
- hash: 468b1799fbda3097b345a59bc1fec1cbc2a015efa473b043a69765a987ad54ed
- hash: 4c1baa3abb774b4c649c87417acaa4396eba40e5028b43fade4c685a405cc3bf
- hash: 53a24e00ae671879ea3677a29ee1b10706aa5aa0dccd4697c3a94ee05df2ec45
- hash: 7146774db3c77e27b7eb48745aef56b50e0e7d87280fea03fa6890646af50d50
- hash: 759246465014acaf3e75a575d6fe36720cfdbfe2eeac1893fe6d7a0474815552
- hash: 827b5d8ed210a85bf06214e500a955f5ad72bd0afd90127de727eb7d5d70187e
- hash: 98261d1f92ae8f7a479bc5fc4d0a8d6a76c0d534e63e9edbc2d6257a9ba84b9d
- hash: c1da6449513844277acc969aae853a502f177e92f98d37544f94a8987e6e2308
- hash: c8d2b2ba5b6585584200ca46564b47db8048d748aefbdfe537bceaf27fb93ad7
- hash: f21a7180405c52565fdc7a81b2fb5a494a3d936a25d1b30b9bd4b69a5e1de9a3
- domain: combinechina.com
KeyPlug-Linked Server Exposes Fortinet Exploits & Webshell Activity Targeting a Major Japanese Company
Description
A KeyPlug-linked server briefly exposed a collection of Fortinet firewall and VPN exploit scripts, PHP webshells, and network reconnaissance tools targeting a major Japanese company. This exposure revealed the attacker’s operational workflow, including infrastructure reconnaissance and post-access session management, providing rare insight into an advanced adversary’s tactics. The threat involves exploitation of Fortinet vulnerabilities, notably CVE-2024-23108 and CVE-2024-23109, though no active widespread exploitation has been confirmed. The attacker group identified is RedGolf, known for targeted intrusions. The exposure was short-lived but highlights the risk of Fortinet device exploitation and subsequent internal network compromise. European organizations using Fortinet products could be at risk if targeted by similar campaigns. Mitigation requires immediate patching of Fortinet vulnerabilities, enhanced monitoring for webshell activity, and restricting access to internal portals. Countries with significant Fortinet deployments and strategic sectors similar to the Japanese target are most likely affected. The threat is assessed as high severity due to the potential for unauthorized access, lateral movement, and data compromise without requiring user interaction. Defenders should prioritize Fortinet patch management and network segmentation to reduce exposure.
AI-Powered Analysis
Technical Analysis
The threat centers on a server linked to the KeyPlug malware infrastructure that was briefly exposed, revealing a suite of tools used in active cyber operations against a major Japanese company. The exposed tools included exploit scripts targeting Fortinet firewall and VPN vulnerabilities, specifically CVE-2024-23108 and CVE-2024-23109, which allow attackers to bypass authentication or execute arbitrary code. Additionally, PHP webshells were found, enabling persistent remote access and command execution within the victim’s network. The server also contained network reconnaissance utilities designed to fingerprint content delivery networks (CDNs) and probe authentication portals, indicating a methodical approach to internal network mapping and session management post-compromise. The adversary behind this activity is identified as RedGolf, a group known for sophisticated targeted attacks. Although the exposure lasted less than a day and no widespread exploitation is currently confirmed, the incident provides valuable insight into the attacker’s workflow from initial reconnaissance to maintaining access. The presence of encrypted command execution tools suggests attempts to evade detection and maintain stealth. This threat highlights the ongoing risk posed by unpatched Fortinet devices, which are widely used globally, including in Europe, for firewall and VPN services. The operational details exposed underscore the importance of continuous monitoring and rapid patch deployment to defend against advanced persistent threats leveraging such vulnerabilities.
Potential Impact
For European organizations, the exploitation of Fortinet firewall and VPN vulnerabilities could lead to unauthorized network access, data exfiltration, and disruption of critical services. Given Fortinet’s significant market share in Europe’s enterprise and government sectors, successful exploitation could compromise sensitive information and internal systems. The use of webshells and encrypted command utilities enables attackers to maintain persistence and move laterally within networks, increasing the risk of widespread compromise. Organizations in sectors such as finance, telecommunications, and critical infrastructure are particularly at risk due to their reliance on Fortinet products and the strategic value of their data. The exposure of internal portals and authentication mechanisms could facilitate credential theft and privilege escalation. Although no active widespread exploitation is confirmed, the demonstrated attacker capabilities and tooling suggest a high potential impact if leveraged in targeted campaigns against European entities. The incident also raises concerns about supply chain and third-party risk, as attackers may target partners or vendors using similar infrastructure.
Mitigation Recommendations
European organizations should immediately verify and apply patches for Fortinet vulnerabilities CVE-2024-23108 and CVE-2024-23109 to close known exploit vectors. Conduct comprehensive network scans to detect any signs of webshells or unauthorized scripts, focusing on internal portals and authentication systems. Implement strict network segmentation to limit lateral movement opportunities for attackers who gain initial access. Enhance logging and monitoring for unusual command execution patterns, especially encrypted or obfuscated traffic indicative of command and control activity. Restrict access to Fortinet management interfaces using multi-factor authentication and IP whitelisting. Regularly audit and update VPN configurations to ensure secure authentication and session management. Employ threat hunting exercises to identify any indicators of compromise related to KeyPlug or RedGolf activity. Collaborate with threat intelligence providers to stay informed about emerging tactics and indicators. Finally, conduct targeted user awareness training on phishing and social engineering, as initial access vectors may involve credential compromise.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://hunt.io/blog/keyplug-server-exposes-fortinet-exploits-webshells"]
- Adversary
- RedGolf
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2024-23108 | — | |
cveCVE-2024-23109 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash71842588ace7442bee095dab2782f253 | — | |
hash90a7fa13f9fad5626d166ef3c0e14c0d | — | |
hash1567b74dfcdf7c4c2454f2b84ecee915d9bb3f11 | — | |
hash6b325f1cd5626d15c10b45793ffe88edf4ca07a9 | — | |
hash09b220a315ea0aebae2de835a3240d3690c962a3c801dd1c1cf6e6e2c84ede95 | — | |
hash2386baf4bf3a57ae7bca44c952855a98edf569da7b62bb0c8cbe414f1800d2b6 | — | |
hash468b1799fbda3097b345a59bc1fec1cbc2a015efa473b043a69765a987ad54ed | — | |
hash4c1baa3abb774b4c649c87417acaa4396eba40e5028b43fade4c685a405cc3bf | — | |
hash53a24e00ae671879ea3677a29ee1b10706aa5aa0dccd4697c3a94ee05df2ec45 | — | |
hash7146774db3c77e27b7eb48745aef56b50e0e7d87280fea03fa6890646af50d50 | — | |
hash759246465014acaf3e75a575d6fe36720cfdbfe2eeac1893fe6d7a0474815552 | — | |
hash827b5d8ed210a85bf06214e500a955f5ad72bd0afd90127de727eb7d5d70187e | — | |
hash98261d1f92ae8f7a479bc5fc4d0a8d6a76c0d534e63e9edbc2d6257a9ba84b9d | — | |
hashc1da6449513844277acc969aae853a502f177e92f98d37544f94a8987e6e2308 | — | |
hashc8d2b2ba5b6585584200ca46564b47db8048d748aefbdfe537bceaf27fb93ad7 | — | |
hashf21a7180405c52565fdc7a81b2fb5a494a3d936a25d1b30b9bd4b69a5e1de9a3 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaincombinechina.com | — |
Threat ID: 682c992c7960f6956616a159
Added to database: 5/20/2025, 3:01:00 PM
Last enriched: 1/14/2026, 2:40:52 PM
Last updated: 2/4/2026, 10:14:22 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
MediumThreatFox IOCs for 2026-02-03
MediumNotepad++ supply chain attack breakdown
MediumInfostealers without borders: macOS, Python stealers, and platform abuse
MediumThe Chrysalis Backdoor: A Deep Dive into Lotus Blossom's toolkit
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.