fortinet vulnerabilities enable ransomware

While security experts were busy monitoring known threats, a new ransomware operation called SuperBlack quietly emerged, exploiting critical vulnerabilities in Fortinet devices worldwide. The attacks, attributed to an operator known as Mora_001, target two serious authentication bypass flaws: CVE-2024-55591 and CVE-2025-24472. Yeah, those are a mouthful, but they’re basically skeleton keys to your network.

These vulnerabilities affect FortiOS and FortiProxy devices, with over 48,000 internet-facing systems currently at risk. Attackers aren’t wasting time. They’re gaining super_admin privileges through these flaws, creating backdoor admin accounts, and modifying automation tasks for persistence. Pretty slick move.

Attackers are exploiting Fortinet flaws to gain admin privileges, create backdoors, and set up persistent access. Slick and systematic.

What makes SuperBlack particularly nasty? It’s built on LockBit‘s foundation. The ransomware uses code from the leaked LockBit 3.0 builder, even incorporating a TOX chat ID tied to previous LockBit operations. Not exactly subtle about their inspiration.

The attack pattern is distressingly efficient. First, they map the network and perform lateral movement using stolen credentials. Then comes the double whammy – data theft followed by encryption. Domain controllers, file servers, databases – nothing’s off limits. Post-compromise analysis reveals the threat actors utilize WMIC for discovery and SSH to access additional systems within the compromised environments.

And when they’re done? A custom tool called WipeBlack erases evidence of the ransomware executable. How thoughtful of them.

Forescout researchers discovered these attacks in late January 2025, though exploitation actually began in November 2024. The timeline is alarming. Organizations had precious little warning before attackers started compromising systems at breakneck speed – sometimes within just 48 hours of initial access. Technical intelligence has been crucial in identifying these indicators of compromise before widespread damage occurs.

Fortinet eventually acknowledged both vulnerabilities, recommending upgrades to patched versions immediately. This situation bears striking resemblance to the critical CVE-2024-21762 flaw previously disclosed in FortiOS with a 9.6 CVSS score. But for many victims, it’s already too late. The campaign spans 70+ countries, hitting SMBs and critical infrastructure particularly hard.

The ransomware ecosystem never sleeps. It just rebrands and comes back stronger.

You May Also Like

Spearwing Raas Group Escalates Cyber Warfare With Medusa Ransomware Surge

Russian hackers expand their criminal empire while competitors falter. Spearwing’s Medusa ransomware quietly doubled attacks in 2025, demanding up to $15 million from victims. Your organization could be next.

Crazyhunter: the Ransomware Threatening to Obliterate Your Data With Unprecedented Ferocity

CrazyHunter isn’t just another ransomware—it’s an AI-powered obliterator that leaves nothing but ashes where your data once lived. Your best defenses are failing against this predator with a 61% evasion rate. Digital extinction awaits.

Extradited LockBit Developer Faces Justice in New Jersey After Alleged Cybercrime Spree

LockBit’s critical developer faces 41 charges with $500M in digital heists across 2,500 victims. His capture exposes the terrifying reach of ransomware’s deadliest operation. Justice finally arrives.

Unclaimed Mystique: Cyberattack on National Presto Industries Highlights Ransomware Fears

Defense contractor infiltration exposes military data to ransomware attackers while executives downplay the breach. National Presto’s quiet SEC disclosure masks potentially devastating consequences for national security.