Between January and March, researchers at Forescout Research – Vedere Labs observed a threat actors exploiting two Fortinet vulnerabilities to deploy the SuperBlack ransomware. The experts attribute the attacks to a threat actor named “Mora_001” which using Russian-language artifacts and exhibiting a unique operational signature. The experts speculate Mora_001 could be linked to the LockBit ecosystem, reflecting the growing complexity of ransomware operations.
Mora_001 used the leaked LockBit builder to create encryptor, tracked by Forescout as SuperBlack ransomware, and removed any LockBit’s branding.
However Mora_001 is tracked as an independent threat actor, it exhibits consistent post-exploitation tactics, including identical usernames across victims, overlapping IPs, and rapid ransomware deployment within 48 hours. It is interesting to note that the ransom note shares a TOX ID with LockBit, suggesting a potential affiliation. However, its structured playbook and unique operational patterns distinguish it as a separate entity capable of independent intrusions.
The threat actor exploited CVE-2024-55591 and CVE-2025-24472 in FortiOS and FortiProxy to gain super-admin access on vulnerable Fortinet appliances.
“CVE-2024-55591 and CVE-2025-24472 allow unauthenticated attackers to gain super_admin
privileges on vulnerable FortiOS devices (<7.0.16) with exposed management interfaces.” reads the report published by Forescout. “A proof-of-concept (PoC) exploit was publicly released on January 27, and within 96 hours”
CVE-2024-55591 in January, later adding CVE-2025-24472 as another attack vector. Just four days after a proof-of-concept exploit for FortiOS was published on January 27, Forescout observed Mora_001 using it to create at least one local system admin account, demonstrating rapid weaponization of these vulnerabilities.
Fortinet patchedThe attackers used two distinct methods:
The threat actor utilized both the default PoC exploit and slightly modified versions with minor changes, such as altered usernames and IP addresses.
“When the firewall had VPN capabilities, the threat actor created local VPN user accounts with names resembling legitimate accounts but with an added digit at the end. These newly created users were then added to the VPN user group, enabling future logins.” reads the report. “This tactic was likely intended to evade detection during casual administrative reviews, and to maintain persistent access even if the initial entry points were discovered. The actor then manually assigned a password to the newly created users.”
Mora_001 targeted high-value assets like servers and domain controllers, using WMIC for discovery and SSH for access, deploying ransomware only after data exfiltration.
SuperBlack modifies LockBit 3.0’s ransom note and exfiltration tool but retains a wiper component, WipeBlack, which erases ransomware traces post-encryption.
“We have designated this wiper component as “WipeBlack” which has been observed in previous ransomware incidents tied to LockBit and BrainCipher. BrainCipher, in turn, has been linked to SenSayQ, EstateRansomware, and RebornRansomware. Additionally, the wiper’s builder is associated with the leaked LockBit builder, reinforcing its connection to LockBit-linked ransomware operations.” concludes the report. “The wiper file is designed to remove evidence of the ransom executable after encryption.”
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, SuperBlack ransomware)