Ransomware, Breach

Vulnerable Fortinet Firewalls Subjected To New LockBit-Linked Intrusions

(Adobe Stock)

Attacks exploiting a pair of Fortinet FortiGate firewall authentication bypass vulnerabilities, tracked as CVE-2024-55591 and CVE-2025-24472, have been launched by the newly-emergent Mora_001 threat operation to facilitate the spread of the novel LockBit 3.0-based SuperBlack ransomware since January, reports SC Media.

Forescout researchers reported that after infiltrating vulnerable Fortinet firewalls and securing "super_admin" privileges, Mora_001 proceeded with establishing privileged accounts and creating local user accounts typosquatting legitimate users in firewalls with VPN capabilities for persistence. They also exploited authentication infrastructure in those without for further firewall compromise.

Intelligence obtained through numerous FortiGate dashboards, a VPN brute-forcing tool, and Windows Management Instrumentation have also been leveraged by Mora_001 to compromise authentication, file, and database servers, as well as domain controllers with SuperBlack. It was later removed using a wiper tool.

Aside from SuperBlack being derived from LockBit 3.0, Mora_001's ransom note also had a TOX chat ID previously found to be associated with LockBit, while its WipeBlack wiper was tied to both LockBit and BrainCipher. Such a link between both operations indicates the ransomware landscape's increasingly intertwined nature, according to the Forescout researchers.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

Related Terms

Attack Vector

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.