A new custom Windows and Linux malware dubbed “BOLDMOVE” was used to exploit a recently disclosed vulnerability in FortiOS SSL-VPN. The vulnerability was fixed in November and then disclosed by Fortinet in December. The vulnerability allows for remote unauthenticated attackers to crash remote devices as well as execute remote code. Mandiant reported that this vulnerability was exploited by a threat campaign involving BOLDMOVE that has been ongoing since October 2022 that is specifically crafted to target FortiOS devices. This malware is linked to a suspected Chinese ATP and is a full-featured backdoor with the following core capabilities, among numerous varying capabilities:
- System surveying
- Receiving commands from C2 Server
- Remote shell
- Traffic relaying
While the Windows and Linux versions are very similar, Mandiant believes the Windows version was compiled in 2021. Additionally, only the Linux variant specifically targets FortiOS devices. For example, some additional capabilities that the Linux version has are:
- Modification of Fortinet logs
- Disablement of logging daemons
- Send requests to internal Fortinet services