KeyPlug-Linked Server Exposes Fortinet Exploits & Webshell Activity Targeting a Major Japanese Company
A server linked to KeyPlug malware briefly exposed tooling used in active operations. The infrastructure, live for less than a day, revealed Fortinet firewall and VPN exploit scripts, a PHP webshell, and network reconnaissance tools targeting authentication and internal portals of a major Japanese company. The exposed directory provided insight into the attacker's workflow, from infrastructure reconnaissance to post-access session management. Notable files included Fortinet reconnaissance scripts, CDN fingerprinting tools, and encrypted command execution utilities. The server's brief exposure offers a rare glimpse into the operational staging and planning of a likely advanced adversary.
Pulse ID: 6801707ed48a87a19adaf031
Pulse Link: https://otx.alienvault.com/pulse/6801707ed48a87a19adaf031
Pulse Author: AlienVault
Created: 2025-04-17 21:19:58
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
