Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

KeyPlug-Linked Server Exposes Fortinet Exploits & Webshell Activity Targeting a Major Japanese Company

0
Medium
Published: Thu Apr 17 2025 (04/17/2025, 21:19:58 UTC)
Source: AlienVault OTX

Description

A KeyPlug-linked server briefly exposed a collection of Fortinet firewall and VPN exploit scripts, PHP webshells, and network reconnaissance tools targeting a major Japanese company. This exposure revealed the attacker’s operational workflow, including infrastructure reconnaissance and post-access session management, providing rare insight into an advanced adversary’s tactics. The threat involves exploitation of Fortinet vulnerabilities, notably CVE-2024-23108 and CVE-2024-23109, though no active widespread exploitation has been confirmed. The attacker group identified is RedGolf, known for targeted intrusions. The exposure was short-lived but highlights the risk of Fortinet device exploitation and subsequent internal network compromise. European organizations using Fortinet products could be at risk if targeted by similar campaigns. Mitigation requires immediate patching of Fortinet vulnerabilities, enhanced monitoring for webshell activity, and restricting access to internal portals. Countries with significant Fortinet deployments and strategic sectors similar to the Japanese target are most likely affected. The threat is assessed as high severity due to the potential for unauthorized access, lateral movement, and data compromise without requiring user interaction. Defenders should prioritize Fortinet patch management and network segmentation to reduce exposure.

AI-Powered Analysis

AILast updated: 01/14/2026, 14:40:52 UTC

Technical Analysis

The threat centers on a server linked to the KeyPlug malware infrastructure that was briefly exposed, revealing a suite of tools used in active cyber operations against a major Japanese company. The exposed tools included exploit scripts targeting Fortinet firewall and VPN vulnerabilities, specifically CVE-2024-23108 and CVE-2024-23109, which allow attackers to bypass authentication or execute arbitrary code. Additionally, PHP webshells were found, enabling persistent remote access and command execution within the victim’s network. The server also contained network reconnaissance utilities designed to fingerprint content delivery networks (CDNs) and probe authentication portals, indicating a methodical approach to internal network mapping and session management post-compromise. The adversary behind this activity is identified as RedGolf, a group known for sophisticated targeted attacks. Although the exposure lasted less than a day and no widespread exploitation is currently confirmed, the incident provides valuable insight into the attacker’s workflow from initial reconnaissance to maintaining access. The presence of encrypted command execution tools suggests attempts to evade detection and maintain stealth. This threat highlights the ongoing risk posed by unpatched Fortinet devices, which are widely used globally, including in Europe, for firewall and VPN services. The operational details exposed underscore the importance of continuous monitoring and rapid patch deployment to defend against advanced persistent threats leveraging such vulnerabilities.

Potential Impact

For European organizations, the exploitation of Fortinet firewall and VPN vulnerabilities could lead to unauthorized network access, data exfiltration, and disruption of critical services. Given Fortinet’s significant market share in Europe’s enterprise and government sectors, successful exploitation could compromise sensitive information and internal systems. The use of webshells and encrypted command utilities enables attackers to maintain persistence and move laterally within networks, increasing the risk of widespread compromise. Organizations in sectors such as finance, telecommunications, and critical infrastructure are particularly at risk due to their reliance on Fortinet products and the strategic value of their data. The exposure of internal portals and authentication mechanisms could facilitate credential theft and privilege escalation. Although no active widespread exploitation is confirmed, the demonstrated attacker capabilities and tooling suggest a high potential impact if leveraged in targeted campaigns against European entities. The incident also raises concerns about supply chain and third-party risk, as attackers may target partners or vendors using similar infrastructure.

Mitigation Recommendations

European organizations should immediately verify and apply patches for Fortinet vulnerabilities CVE-2024-23108 and CVE-2024-23109 to close known exploit vectors. Conduct comprehensive network scans to detect any signs of webshells or unauthorized scripts, focusing on internal portals and authentication systems. Implement strict network segmentation to limit lateral movement opportunities for attackers who gain initial access. Enhance logging and monitoring for unusual command execution patterns, especially encrypted or obfuscated traffic indicative of command and control activity. Restrict access to Fortinet management interfaces using multi-factor authentication and IP whitelisting. Regularly audit and update VPN configurations to ensure secure authentication and session management. Employ threat hunting exercises to identify any indicators of compromise related to KeyPlug or RedGolf activity. Collaborate with threat intelligence providers to stay informed about emerging tactics and indicators. Finally, conduct targeted user awareness training on phishing and social engineering, as initial access vectors may involve credential compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://hunt.io/blog/keyplug-server-exposes-fortinet-exploits-webshells"]
Adversary
RedGolf

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2024-23108
cveCVE-2024-23109

Hash

ValueDescriptionCopy
hash71842588ace7442bee095dab2782f253
hash90a7fa13f9fad5626d166ef3c0e14c0d
hash1567b74dfcdf7c4c2454f2b84ecee915d9bb3f11
hash6b325f1cd5626d15c10b45793ffe88edf4ca07a9
hash09b220a315ea0aebae2de835a3240d3690c962a3c801dd1c1cf6e6e2c84ede95
hash2386baf4bf3a57ae7bca44c952855a98edf569da7b62bb0c8cbe414f1800d2b6
hash468b1799fbda3097b345a59bc1fec1cbc2a015efa473b043a69765a987ad54ed
hash4c1baa3abb774b4c649c87417acaa4396eba40e5028b43fade4c685a405cc3bf
hash53a24e00ae671879ea3677a29ee1b10706aa5aa0dccd4697c3a94ee05df2ec45
hash7146774db3c77e27b7eb48745aef56b50e0e7d87280fea03fa6890646af50d50
hash759246465014acaf3e75a575d6fe36720cfdbfe2eeac1893fe6d7a0474815552
hash827b5d8ed210a85bf06214e500a955f5ad72bd0afd90127de727eb7d5d70187e
hash98261d1f92ae8f7a479bc5fc4d0a8d6a76c0d534e63e9edbc2d6257a9ba84b9d
hashc1da6449513844277acc969aae853a502f177e92f98d37544f94a8987e6e2308
hashc8d2b2ba5b6585584200ca46564b47db8048d748aefbdfe537bceaf27fb93ad7
hashf21a7180405c52565fdc7a81b2fb5a494a3d936a25d1b30b9bd4b69a5e1de9a3

Domain

ValueDescriptionCopy
domaincombinechina.com

Threat ID: 682c992c7960f6956616a159

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 1/14/2026, 2:40:52 PM

Last updated: 2/4/2026, 10:14:22 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats