Cyber Security News

RedGolf Hackers Expose Fortinet Exploits & Tools Used to Hack Organizations

RedGolf, a sophisticated threat actor with ties to APT41, provided a rare insight into its operational toolbox after a directory on their attack infrastructure was briefly exposed.

The server, linked to KeyPlug malware activities, inadvertently revealed a comprehensive arsenal of exploitation tools, reconnaissance scripts, and post-compromise utilities targeting Fortinet devices and a major Japanese corporation.

RedGolf Operations Exposed

Security researcher Jane_0sint first highlighted the server at IP 154.31.217.200 on social media, noting its connection to RedGolf operations. 

Further investigation revealed it shared a WolfSSL-issued TLS certificate with five other servers hosted on Vultr. 

Among these servers, 45.77.34.88 exposed a directory through a Python SimpleHTTP server for less than 24 hours, providing researchers an unfiltered view of the group’s operational files.

The WolfSSL certificate details included:

  • Subject Common Name: www.wolfssl.com.
  • Subject Organizational Unit: Support_1024.
  • SHA-256 Fingerprint: 4C1BAA3ABB774B4C649C87417ACAA4396EBA40E5028B43FADE4C685A405CC3BF.

Zero-Day Exploitation of Fortinet Devices

Hunt.io reports that among the exposed files, ws_test.py, which appears to automate exploitation of Fortinet WebSocket CLI vulnerabilities similar to CVE-2024-23108 and CVE-2024-23109. 

The script targets unauthenticated WebSocket endpoints in FortiOS versions 7.0.0 to 7.0.15 to execute privileged commands:

The script subsequently sends a payload to bypass authentication and execute administrative commands:

Files within the exposed directory indicate RedGolf has been actively targeting Shiseido, a prominent Japanese cosmetics company operating in 120 countries. 

A file named alive_urls_20250305_090959.txt contained nearly one hundred Shiseido domains focusing on authentication systems, internal portals, and identity providers.

The attackers employed script.py, a CDN fingerprinting tool designed to identify unprotected assets by checking for the absence of CDN-related HTTP headers like CF-RAY or Akamai-Cache-Status.

Post-Exploitation Toolkit

The exposed arsenal included sophisticated post-exploitation tools:

bx.php – A compact PHP webshell that receives AES-128 encrypted commands, decrypts them with the key a75d6a841eafd550, and executes them without leaving traces in logs.

client.ps1 – A PowerShell reverse shell that establishes encrypted communication with the control server:

An ELF binary named Server that operates as a command-and-control interface for managing compromised systems.

This rare exposure provides cybersecurity professionals an uncommon opportunity to understand the sophisticated tactics employed by nation-state affiliated threat actors. 

For Fortinet customers, it highlights the urgent need to patch devices and implement additional monitoring for WebSocket exploitation attempts.

Security experts recommend organizations use Fortinet products to immediately update to the latest firmware versions and monitor for suspicious access patterns to CLI endpoints, particularly those involving WebSocket connections or forwarded headers indicating local access attempts.

Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Russian Cybercriminal Charged in $24 Million Qakbot Ransomware Scheme

The U.S. Department of Justice unsealed federal charges Thursday against Russian national Rustam Rafailevich Gallyamov,…

4 hours ago

Bypassing Zero-Trust Policies to Exploit Vulnerabilities & Manipulate NHI Secrets

A comprehensive security research demonstration has revealed how attackers can systematically undermine modern zero-trust security…

8 hours ago

Threat Actor Allegedly Selling Burger King Backup System RCE Vulnerability for $4,000

A cybersecurity threat has emerged targeting one of the world's largest fast-food chains, as a…

8 hours ago

GenAI Assistant DIANNA Uncovering New Obfuscated Malware

The cybersecurity landscape witnessed a significant milestone this February with the emergence of BypassERWDirectSyscallShellcodeLoader, a…

8 hours ago

Hackers Attacking macOS Users With Fake Ledger Apps to Deploy Malware

Cybercriminals are increasingly targeting cryptocurrency users through sophisticated malware campaigns that exploit the trust placed…

9 hours ago

New Formjacking Malware Attacking E-Commerce Pages to Steal Credit Card Data

Cybersecurity researchers have uncovered a sophisticated new formjacking malware campaign targeting WooCommerce-powered e-commerce websites, representing…

13 hours ago