Open Nav
Sign Up

‘UMBRELLA STAND’ Malware Targets Fortinet FortiGate Firewalls

umbrella stand fortinet

Filip Dimitrov

June 24, 2025

‘UMBRELLA STAND’ Malware Targets Fortinet FortiGate Firewalls

The UK’s National Cyber Security Centre (NCSC) has issued an alert regarding a sophisticated malware campaign dubbed “UMBRELLA STAND”, actively targeting internet-facing Fortinet FortiGate firewalls. This campaign is designed for long-term persistence and covert access to enterprise networks through stealthy exploitation of FortiOS vulnerabilities.

  • Published: June 24, 2025
  • Threat Level: High
  • Targeted Devices: Fortinet FortiGate 100D Series

Technical Overview

UMBRELLA STAND is a modular malware framework that:

  • Establishes persistent remote access via hijacking reboot functions and dynamic linker hijacking (ldpreload)
  • Evades detection through fake TLS communication on port 443 and file obfuscation
  • Executes shell commands and captures network traffic using tools like BusyBox, tcpdump, and nbtscan

Unlike legitimate TLS traffic, UMBRELLA STAND sends AES-encrypted payloads using fake handshake headers to a hardcoded C2 IP: 89.44.194.32, making malicious traffic blend into HTTPS streams.

⚙️ Capabilities and Persistence

  • Remote Command Execution via ash and BusyBox shells
  • Configurable Beaconing intervals and dynamic C2 redirection
  • Persistence through:
    • Modified reboot functions
    • ld.so.preload injection (libguic.so)
    • Hidden directories (/data2/.ztls/)
  • Process Hiding using impersonation (e.g., renaming processes to /bin/httpsd)
  • Malicious sysctl binary manipulates legitimate Fortinet protections to hide payloads

Indicators of Compromise (IOCs)

TypeDescriptionValue/Path
IPv4C2 Infrastructure89.44.194.32
DirectoryHidden Directory/data2/.ztls/
FileMain Networking Binaryblghtd
FileWatchdog Processjvnlpe
FileBusyBox Variantlidwok
ProcessImpersonation Name/bin/httpsd
PathTemp File/tmp/%d.sv
PathConfig File (.ini)/data2/tmp/%s.ini
YARADetection RulesUMBRELLA_STAND_stack_constants_used_for_cryptUMBRELLA_STAND_injected_tool_load_mechanism

Recommended Actions

For organizations using FortiGate firewalls should immediately path to the latest FortiOS versions and monitor for suspicious TLS traffic on port 443. 

YARA rules provided by NCSC can be deployed to scan for encrypted strings and injected loaders.

Need Help? Contact OP Innovate

Our incident response and red team experts recommend proactive hunting across device firmware and logs, not just endpoint monitoring.

If you suspect compromise or need assistance in validating exposure, contact OP Innovate’s Incident Response team immediately.

📧 Contact Us

Under Cyber Attack?

Fill out the form and we will contact you immediately.