Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Berliners swim in the Spree River to protest 100-year ban

June 17, 2025

Juneteenth highlights tribal slavery descendants’ citizenship struggle

June 17, 2025

Weeds can give us clues about the lawn

June 17, 2025
Facebook X (Twitter) Instagram
Trending
  • Berliners swim in the Spree River to protest 100-year ban
  • Juneteenth highlights tribal slavery descendants’ citizenship struggle
  • Weeds can give us clues about the lawn
  • Trump Just Disclosed Earning $57.4 Million From World Liberty Financial—Here’s What We Know
  • How the humble water gun became the symbol of Barcelona’s anti-tourism movement
  • Recipe for Nigerian-inspired fried rice is easy for a weeknight
  • Amusement parks face tariffs and economic uncertainty
  • Appalachian Trail thru-hikers take on half-gallon ice cream eating challenge
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Wednesday, June 18
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks
Cybersecurity

Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks

adminBy adminMarch 14, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 46


A Russian threat actor has been exploiting two Fortinet firewall vulnerabilities in attacks leading to ransomware deployments, cybersecurity firm Forescout warns.

The hacking group, tracked as Mora_001, apparently adopted a leaked LockBit builder to create its own file-encrypting ransomware variant that Forescout has dubbed SuperBlack.

Mora_001, the cybersecurity firm says, has ties to established ransomware gangs, based on its post-exploitation patterns, the use of the leaked builder, and the use of the same ID as LockBit for the peer-to-peer communication service Tox.

“The post-exploitation patterns observed enabled us to define a unique operational signature that sets Mora_001 apart from other ransomware operators, including LockBit affiliates. This consistent operational framework suggests a distinct threat actor with a structured playbook,” Forescout notes.

The threat actor has been observed exploiting CVE-2024-55591 and CVE-2025-24472, two vulnerabilities in FortiOS and FortiProxy that allow attackers to elevate their privileges to super-admin on a vulnerable Fortinet appliance.

Fortinet announced patches for CVE-2024-55591 in January, warning of its in-the-wild exploitation as a zero-day. On February 11, the company updated its advisory to add CVE-2025-24472, which covers an additional attack vector.

Within four days after a proof-of-concept (PoC) exploit targeting vulnerable FortiOS devices was published on January 27, Forescout observed Mora_001 employing it in attacks to create at least one local system admin user account.

“In some cases, instead of relying on a single administrative account for all actions, the threat actor employed a chaining method, where each newly created administrative account was used to generate additional accounts,” Forescout explains.

Advertisement. Scroll to continue reading.

Following the local administrator account creation, the attackers downloaded the firewall configuration file, which contains critical information, modified system settings, and created a scripted automation task to recreate the super admin user if it was deleted.

The threat actor was also seen creating local VPN user accounts, attempting to log in to other firewalls, and abusing the built-in FortiGate dashboards for reconnaissance, likely looking for lateral movement paths.

Mora_001 focused on compromising high-value targets within the victims’ environments, such as servers and domain controllers, using WMIC for remote system discovery and SSH for access. The file-encrypting ransomware was executed only after data exfiltration was completed.

“In one confirmed case, the attacker focused on identifying and compromising file servers, which became primary targets for data exfiltration and ransomware deployment. Instead of encrypting the entire network, the attacker selectively encrypted file servers containing sensitive data,” Forescout explains.

Compared to LockBit 3.0, SuperBlack drops a modified ransom note and uses a different data exfiltration executable, but drops a wiper component previously associated with LockBit and BrainCipher. Dubbed WipeBlack, it removes evidence of the ransomware executable after encryption.

Related: Medusa Ransomware Made 300 Critical Infrastructure Victims

Related: Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks

Related: Vulnerable Paragon Driver Exploited in Ransomware Attacks

Related: New Anubis Ransomware Could Pose Major Threat to Organizations



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Trump Just Disclosed Earning $57.4 Million From World Liberty Financial—Here’s What We Know

June 16, 2025

Topline President Donald Trump earned $57.4 million from World Liberty Financial, a crypto company he…

Private Equity’s First Woman Billionaire Owns San Diego Soccer Team

June 11, 2025

Billionaire Walmart Heiress Urges People To ‘Mobilize’ At June 14 Anti-Trump Protests

June 11, 2025

Anduril Cofounder Trae Stephens Is Now A Billionaire

June 10, 2025
Our Picks

Berliners swim in the Spree River to protest 100-year ban

June 17, 2025

Juneteenth highlights tribal slavery descendants’ citizenship struggle

June 17, 2025

Weeds can give us clues about the lawn

June 17, 2025

Trump Just Disclosed Earning $57.4 Million From World Liberty Financial—Here’s What We Know

June 16, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.