Are Fortinet Users at Risk from Mora_001’s SuperBlack Ransomware?

Article Highlights
Off On

The cybersecurity landscape has been rocked by revelations that two vulnerabilities in Fortinet systems, CVE-2024-55591 and CVE-2025-24472, have been exploited by a new menace identified as “Mora_001.” This threat actor has leveraged these weaknesses to deploy SuperBlack ransomware, raising alarms in the tech community. Mora_001’s tactics bear a striking resemblance to those used by the infamous LockBit ransomware group, a connection that has not gone unnoticed by security experts. LockBit, known for its lucrative ransomware attacks, faced significant setbacks in 2024 when international law enforcement efforts led to several arrests and the seizure of devices. Despite these disruptions, the cybercriminal organization remains active, and a developer associated with the group was arrested in Israel for aiding in the creation of ransomware tools.

Critical Vulnerabilities Exploited

The exploitation of the two Fortinet vulnerabilities by Mora_001 highlights the ongoing threats posed by unpatched and vulnerable systems. CVE-2024-55591 and CVE-2025-24472 serve as gateways for the deployment of SuperBlack ransomware, which can cripple an organization’s network infrastructure. Security researchers from Forescout Research–Vedere Labs have underscored the significance of mitigating such threats through a multi-layered defense strategy. Essential steps include patching vulnerable systems, segmenting networks to limit the spread of attacks, and implementing robust security controls that can thwart unauthorized access. In addition, restricting management access, auditing administrator accounts, and reviewing VPN users are crucial measures that fortify the network against such exploits. Notably, the US leads in the number of exposed FortiGate firewalls, followed by India and Brazil, reflecting global exposure to these vulnerabilities.

Vigilance and Robust Cybersecurity Measures Needed

Organizations need to act quickly to counter the threats posed by SuperBlack ransomware and vulnerabilities in Fortinet products. Emphasizing vigilance and strong cybersecurity measures is critical. Security researchers recommend a proactive stance and comprehensive logging to monitor and respond to potential breaches. This defense-in-depth strategy provides multiple security layers, enhancing resilience against advanced cyber threats. The global landscape of ransomware has evolved, with threat actors like Mora_001 and groups like LockBit constantly changing their tactics. Organizations must continuously update and monitor network systems to reduce exploitation risks. Defending against these sophisticated threats requires systems to be up-to-date and fortified. The cybersecurity community must stay alert to persistent dangers, working collectively to protect critical infrastructure and sensitive data from cybercriminal activities. By focusing on these strategies, organizations can better safeguard their assets and maintain robust security postures in the face of evolving cyber threats.

Explore more

Cognitive Workforce Twins: Revolutionizing HRtech with AI

Setting the Stage for HRtech Transformation In today’s fast-paced business environment, HR technology stands at a critical juncture, grappling with the challenge of managing a workforce that is increasingly hybrid, diverse, and skill-dependent. A staggering statistic reveals that over 60% of organizations struggle with skill gaps that hinder their ability to adapt to technological advancements, underscoring a pressing need for

How Can Employers Master Employee Leave Management?

The significance of managing employee leave effectively cannot be overstated, especially when considering that a poorly handled leave process can lead to legal disputes, decreased morale, and operational disruptions. Imagine a scenario where a valued employee requests time off for a medical condition, only to face delays, miscommunication, or perceived unfairness due to unclear policies. Such situations not only risk

Trend Analysis: Multi-Cloud Security Integration

In an era where digital infrastructure spans multiple cloud platforms, the complexity of managing security across diverse environments has become a pressing challenge for enterprises worldwide. As businesses increasingly rely on providers like AWS, Google Cloud, and Microsoft Azure to power their operations, the risk of misconfigurations, compliance gaps, and costly security breaches escalates, underscoring the urgent need for integrated

HR Tech Revolution: Automation and Data Unity for 2026

Setting the Stage for HR Transformation As the business landscape accelerates into a tech-driven future, human resources (HR) departments face mounting pressure to evolve with the times and adapt to new challenges. A staggering 43% of HR decision-makers are prioritizing technology upgrades for 2026, driven by the need to eliminate inefficiencies that plague current operations and hinder productivity. This surge

How Is Majesco Transforming Insurance Claims with AI?

Setting the Stage for AI-Driven Transformation in Insurance In an industry historically bogged down by manual processes and legacy systems, the insurance sector is witnessing a seismic shift with the integration of artificial intelligence (AI). A staggering statistic sets the tone: claims processing times have been reduced from 60 minutes to just 4 minutes by leading innovators, highlighting the urgent