fortinet vulnerabilities enable ransomware

While security experts were busy monitoring known threats, a new ransomware operation called SuperBlack quietly emerged, exploiting critical vulnerabilities in Fortinet devices worldwide. The attacks, attributed to an operator known as Mora_001, target two serious authentication bypass flaws: CVE-2024-55591 and CVE-2025-24472. Yeah, those are a mouthful, but they’re basically skeleton keys to your network.

These vulnerabilities affect FortiOS and FortiProxy devices, with over 48,000 internet-facing systems currently at risk. Attackers aren’t wasting time. They’re gaining super_admin privileges through these flaws, creating backdoor admin accounts, and modifying automation tasks for persistence. Pretty slick move.

Attackers are exploiting Fortinet flaws to gain admin privileges, create backdoors, and set up persistent access. Slick and systematic.

What makes SuperBlack particularly nasty? It’s built on LockBit‘s foundation. The ransomware uses code from the leaked LockBit 3.0 builder, even incorporating a TOX chat ID tied to previous LockBit operations. Not exactly subtle about their inspiration.

The attack pattern is distressingly efficient. First, they map the network and perform lateral movement using stolen credentials. Then comes the double whammy – data theft followed by encryption. Domain controllers, file servers, databases – nothing’s off limits. Post-compromise analysis reveals the threat actors utilize WMIC for discovery and SSH to access additional systems within the compromised environments.

And when they’re done? A custom tool called WipeBlack erases evidence of the ransomware executable. How thoughtful of them.

Forescout researchers discovered these attacks in late January 2025, though exploitation actually began in November 2024. The timeline is alarming. Organizations had precious little warning before attackers started compromising systems at breakneck speed – sometimes within just 48 hours of initial access. Technical intelligence has been crucial in identifying these indicators of compromise before widespread damage occurs.

Fortinet eventually acknowledged both vulnerabilities, recommending upgrades to patched versions immediately. This situation bears striking resemblance to the critical CVE-2024-21762 flaw previously disclosed in FortiOS with a 9.6 CVSS score. But for many victims, it’s already too late. The campaign spans 70+ countries, hitting SMBs and critical infrastructure particularly hard.

The ransomware ecosystem never sleeps. It just rebrands and comes back stronger.

You May Also Like

RansomHub’s Betruger Backdoor: The Surprising Evolution of Ransomware Tactics

RansomHub’s unsettling backdoor technology transforms how criminals attack. Their all-in-one Betruger toolkit silently infiltrates networks while masquerading as legitimate mail apps. Security teams face a nightmarish evolution in ransomware tactics.

How Medusa Ransomware Turns Malicious Drivers Into Undetectable EDR Killers

Even your trusted cybersecurity tools are secretly failing you—Medusa ransomware transforms innocent drivers into lethal weapons that silence defense systems before you know they’re compromised. Your organization could be next.

North Korea’s Moonstone Sleet Unleashes Qilin Ransomware: Are You Next?

North Korea’s hackers abandon homegrown tools for Qilin ransomware, demanding millions from victims worldwide. Your business could be their next payday. No organization is truly safe.

Uncover the Alarming Exploitation of Fortinet Vulnerabilities by SuperBlack Ransomware in 2025

Russian hackers weaponize FortiOS flaws with devastating SuperBlack ransomware, combining encryption and data wiping capabilities. Your security infrastructure might be their next target.