Post

SuperBlack Ransomware Exploits Fortinet Firewall Vulnerabilities in Recent Cyber Attacks

SuperBlack Ransomware Exploits Fortinet Firewall Vulnerabilities in Recent Cyber Attacks

TL;DR

The SuperBlack ransomware, attributed to the threat actor “Mora_001,” has exploited vulnerabilities in Fortinet firewalls for targeted attacks. This ransomware operation highlights the growing complexity of cyber threats and the need for robust security measures.

Main Content

Recent research by Forescout Research – Vedere Labs has uncovered a series of cyber attacks between January and March, where threat actors exploited two vulnerabilities in Fortinet firewalls to deploy the SuperBlack ransomware. The attacks have been attributed to a threat actor named “Mora_001,” which uses Russian-language artifacts and exhibits a unique operational signature. There is speculation that Mora_001 could be linked to the LockBit ecosystem, reflecting the growing complexity of ransomware operations1.

SuperBlack Ransomware and LockBit Connection

Mora_001 utilized the leaked LockBit builder to create an encryptor, tracked by Forescout as SuperBlack ransomware, with all LockBit branding removed. Despite being tracked as an independent threat actor, Mora_001 exhibits consistent post-exploitation tactics, including:

  • Identical usernames across victims
  • Overlapping IPs
  • Rapid ransomware deployment within 48 hours

Interestingly, the ransom note shares a TOX ID with LockBit, suggesting a potential affiliation. However, its structured playbook and unique operational patterns distinguish it as a separate entity capable of independent intrusions.

Exploited Vulnerabilities

The threat actor exploited CVE-2024-55591 and CVE-2025-24472 in FortiOS and FortiProxy to gain super-admin access on vulnerable Fortinet appliances. According to the report published by Forescout2:

“CVE-2024-55591 and CVE-2025-24472 allow unauthenticated attackers to gain super_admin privileges on vulnerable FortiOS devices (<7.0.16) with exposed management interfaces. A proof-of-concept (PoC) exploit was publicly released on January 27, and within 96 hours, it was weaponized by the attackers.”

Attack Methods

The attackers used two distinct methods:

  1. jsconsole: Attackers exploit the WebSocket vulnerability via the jsconsole interface. This activity can be spotted by analyzing logs where it appears as jsconsole(IP), with the IP address often spoofed as recognizable addresses like 127.0.0.1, 13.73.13.73, 8.8.8.8, or 1.1.1.1.
  2. HTTPS: Attackers use direct HTTPS requests. This technique appears differently in logs but targets the same underlying vulnerability.

Rapid Weaponization

Fortinet patched CVE-2024-55591 in January, later adding CVE-2025-24472 as another attack vector. Just four days after a proof-of-concept exploit for FortiOS was published on January 27, Forescout observed Mora_001 using it to create at least one local system admin account, demonstrating rapid weaponization of these vulnerabilities.

The threat actor utilized both the default PoC exploit and slightly modified versions with minor changes, such as altered usernames and IP addresses. According to the report:

“When the firewall had VPN capabilities, the threat actor created local VPN user accounts with names resembling legitimate accounts but with an added digit at the end. These newly created users were then added to the VPN user group, enabling future logins. This tactic was likely intended to evade detection during casual administrative reviews and to maintain persistent access even if the initial entry points were discovered. The actor then manually assigned a password to the newly created users.”

Targeted Assets and Deployment

Mora_001 targeted high-value assets like servers and domain controllers, using WMIC for discovery and SSH for access, deploying ransomware only after data exfiltration. SuperBlack modifies LockBit 3.0’s ransom note and exfiltration tool but retains a wiper component, WipeBlack, which erases ransomware traces post-encryption.

“We have designated this wiper component as ‘WipeBlack,’ which has been observed in previous ransomware incidents tied to LockBit and BrainCipher. BrainCipher, in turn, has been linked to SenSayQ, EstateRansomware, and RebornRansomware. Additionally, the wiper’s builder is associated with the leaked LockBit builder, reinforcing its connection to LockBit-linked ransomware operations. The wiper file is designed to remove evidence of the ransom executable after encryption.”

Conclusion

The SuperBlack ransomware attacks highlight the increasing sophistication of cyber threats and the importance of robust security measures. Organizations must remain vigilant and proactive in patching vulnerabilities and implementing strong security protocols to protect against such evolving threats.

Additional Resources

For further insights, check:

  1. Security Affairs (2025). “LockBit ransomware leaked Boeing data”. Retrieved 2025-03-14. ↩︎

  2. Forescout (2025). “New ransomware operator exploits Fortinet vulnerability”. Retrieved 2025-03-14. ↩︎

This post is licensed under CC BY 4.0 by the author.