5 Shocking Facts: KeyPlug Malware’s Attack on Fortinet Security Systems


Google News

Overview of KeyPlug Malware Exposure

A recent inadvertent exposure linked to the infamous KeyPlug malware revealed a detailed set of tools designed to compromise Fortinet firewall and VPN appliances. This breach provides an unprecedented look into the tactics employed by sophisticated cyber threats against critical network security infrastructure.

Who Is Behind the Leak?

Security experts identified the exposed infrastructure as part of operations by the RedGolf threat group, known for overlaps with APT41. Although the access to the site lasted less than a day, it offered critical insights into the threat actor’s advanced capabilities.

Detailed Attack Mechanisms Revealed

The server (IP: 45.77.34[.]88) contained multiple exploit scripts that target specific vulnerabilities in Fortinet devices, utilizing CVE identifiers such as CVE-2024-23108 and CVE-2024-23109. These scripts exploit weaknesses in unauthenticated WebSocket endpoints to execute privileged commands, potentially granting attackers full control over the targeted devices.

Key Findings from the Rogue Server:

  • Python scripts capable of scanning and identifying Fortinet devices for vulnerabilities.
  • Bypass techniques in the “ws_test.py” script, allowing unauthorized execution of sensitive commands by spoofing local network traffic.
  • Corporate espionage indicators through targeted reconnaissance against leading corporations, including nearly 100 domains associated with the Japanese company Shiseido.

In-Depth Analysis of Malicious Tools

Among the serious threats discovered were sophisticated tools like the “bx.php” webshell. This PHP script executes commands by decrypting payloads received via HTTP POST requests, ensuring that evidence of the intrusion remains minimal on affected systems.

Urgent Security Recommendations

With the exposure of these potent exploits, security professionals strongly advise immediate updates and patches to all Fortinet equipment, vigilance against suspicious WebSocket handshake requests, and a thorough review of historical logs for potential past intrusions.

Conclusion

This event underscores the urgent need for continual vigilance and robust security measures against increasingly sophisticated cyber threats targeting essential communication infrastructures.

Stay informed: Understand the full scope of cybersecurity threats and responses with our Malware Trends Report Q1 2025.

Related: Scammers pose as FBI IC3 employees to ‘help’ recover lost funds

Last Updated: April 18, 2025