Security researchers and national cyber defence authorities are raising the alarm over a sophisticated post-exploitation tool named “SHOE RACK,” which is actively targeting Fortinet 100D series firewalls.
The National Cyber Security Centre (NCSC) has released a detailed advisory dated June 18, 2025, noting the malware’s advanced capabilities for remote shell access and TCP tunneling, raising significant concerns for network defenders.
Developed in Go 1.18 and often distributed as a UPX-packed executable, SHOE RACK distinguishes itself through its unusual use of the Secure Shell (SSH) protocol for covert command and control (C2) communications.
The malware establishes a connection to a custom SSH server at a hardcoded C2 domain currently identified as phcia.duckdns[.]org.
Once executed on a victim device, SHOE RACK employs DNS-over-HTTPS (DoH) to obscure its C2 server’s actual location.
It selects from a list of legitimate DoH providers such as Google, Cloudflare, NextDNS, Quad9, and OpenDNS to resolve its C2 server’s IP address.
This use of encrypted and reputable DNS services makes detection by traditional network monitoring tools much more challenging.
Malicious actors leveraging SHOE RACK can then establish an encrypted channel with the victim’s system. Notably, the malware advertises itself using a falsified SSH version (“SSH-1.1.3”), likely to bypass basic filtering that might block newer or more common SSH versions.
SHOE RACK enables two main channel types:
The NCSC has provided several technical indicators to help organizations identify SHOE RACK infections, including:
The malware is believed to be based on publicly available open-source tooling, specifically the “NHAS” reverse SSH implementation in Go, but has been customized for stealth and persistence.
Its use of DNS-over-HTTPS and clever misuse of the SSH protocol present unique challenges for detection and attribution.
While SHOE RACK’s binary is obfuscated using UPX, its network communications are distinct, primarily due to the unusual SSH version fingerprinting.
Organizations running Fortinet firewalls are advised to review access logs and network traffic for unusual SSH connections, especially those identifying as “SSH-1.1.3.”
Security teams should monitor for DoH queries to known C2 domains and apply the NCSC-provided YARA rules for endpoint detection.
This alert underscores the evolving sophistication of cyber threats and the importance of layered defences, ongoing monitoring, and information sharing with national cybersecurity agencies.
All organizations are encouraged to remain vigilant and ensure that their perimeter devices are regularly patched and monitored for signs of compromise.
NCSC’s full report and indicators are available for government and critical infrastructure sectors to bolster their threat intelligence and incident response capabilities.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…