Article Details
Scrape Timestamp (UTC): 2025-03-13 19:59:16.576
Original Article Text
Click to Toggle View
New SuperBlack ransomware exploits Fortinet auth bypass flaws. A new ransomware operator named 'Mora_001' is exploiting two Fortinet vulnerabilities to gain unauthorized access to firewall appliances and deploy a custom ransomware strain dubbed SuperBlack. The two vulnerabilities, both authentication bypasses, are CVE-2024-55591 and CVE-2025-24472, which Fortinet disclosed in January and February, respectively. When Fortinet first disclosed CVE-2024-55591 on January 14, they confirmed it had been exploited as a zero-day, with Arctic Wolf stating it had been used in attacks since November 2024 to breach FortiGate firewalls. Confusingly, on February 11, Fortinet added CVE-2025-2447 to their January advisory, which led many to believe it was a newly exploited flaw. However, Fortinet told BleepingComputer that this bug was also fixed in January 2024 and was not exploited. "We are not aware of CVE-2025-24472 ever being exploited," Fortinet told BleepingComputer at the time. However, a new report by Forescout researchers, says they discovered the SuperBlack attacks in late January 2025, with the threat actor utilizing CVE-2025-24472 as early as February 2, 2025. "While Forescout itself did not directly report the 24472 exploitation to Fortinet, as one of the affected organizations we worked with was sharing findings from our investigation with Fortinet's PSIRT team," Forescout told BleepingComputer. "Shortly afterward, Fortinet updated their advisory on February 11 to acknowledge CVE-2025-24472 as actively exploited." BleepingComputer contacted Fortinet to clarify this point, but we are still waiting for a response. SuperBlack ransomware attacks Forescout says the Mora_001 ransomware operator follows a highly structured attack chain that doesn't vary much across victims. First, the attacker gains 'super_admin' privileges by exploiting the two Fortinet flaws using WebSocket-based attacks via the jsconsole interface or sending direct HTTPS requests to exposed firewall interfaces. Next, they create new administrator accounts (forticloud-tech, fortigate-firewall, adnimistrator) and modify automation tasks to recreate those if removed. After this, the attacker maps the network and attempts lateral movement using stolen VPN credentials and newly added VPN accounts, Windows Management Instrumentation (WMIC) & SSH, and TACACS+/RADIUS authentication. Mora_001 steals data using a custom tool before encrypting files for double extortion, prioritizing file and database servers and domain controllers. After the encryption process, ransom notes are dropped on the victim's system. A custom-built wiper called 'WipeBlack' is then deployed to remove all traces of ransomware executable to hinder forensic analysis. SuperBlack's link to LockBit Forescout has found extensive evidence indicating strong links between the SuperBlack ransomware operation and LockBit ransomware, although the former appears to act independently. The first element is that the SuperBlack encryptor [VirusTotal] is based on LockBit's 3.0 leaked builder, featuring identical payload structure and encryption methods, but will all original branding striped. Secondly, SuperBlack's ransom note includes a TOX chat ID linked to LockBit operations, suggesting that Mora_001 is either a former LockBit affiliate or a former member of its core team managing ransom payments and negotiations. The third element suggesting a link is the extensive IP address overlaps with previous LockBit operations. Also, WipeBlack has also been leveraged by BrainCipher ransomware, EstateRansomware, and SenSayQ ransomware, all tied to LockBit. Forescout has shared an extensive list of indicators of compromise (IoC) linked to SuperBlack ransomware attacks at the bottom of its report. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
'Mora_001,' a new ransomware group, is exploiting vulnerabilities in Fortinet firewall appliances, specifically CVE-2024-55591 and CVE-2025-24472, to deploy SuperBlack ransomware.
Fortinet disclosed these vulnerabilities in early 2024, with indications that CVE-2024-55591 was exploited as a zero-day, while CVE-2025-24472 was not initially believed to be exploited but was later confirmed.
SuperBlack attacks involve gaining 'super_admin' access using the vulnerabilities, creating malicious admin accounts, and mapping networks for lateral movements and data theft.
The ransomware aims for double extortion by stealing data and encrypting high-value servers, paired with dropping ransom notes and a custom wiper tool called 'WipeBlack' to hinder forensic efforts.
Forensic analysis by Forescout revealed a strong link between SuperBlack and the notorious LockBit ransomware, suggesting operational similarities and possible shared affiliations.
Comprehensive indicators of compromise (IoC) associated with SuperBlack, as described in Forescout’s report, highlight the importance of enhanced monitoring and defense strategies to guard against such sophisticated threats.