黑客利用Fortinet防火墙漏洞部署勒索软件
安全研究人员发现LockBit团伙关联的黑客利用Fortinet防火墙漏洞CVE-2024-55591和CVE-2025-24472部署名为SuperBlack的勒索软件。攻击者优先窃取敏感数据后再加密,显示其以数据盗窃为目标。 Fortinet已发布补丁修复漏洞。 2025-3-17 15:58:18 Author: techcrunch.com(查看原文) 阅读量:9 收藏

Security researchers have observed hackers linked to the notorious LockBit gang exploiting a pair of Fortinet firewall vulnerabilities to deploy ransomware on several company networks. 

In a report published last week, security researchers at Forescout Research said a group it’s tracking dubbed “Mora_001” is exploiting the Fortinet firewalls, which sit on the edge of a company’s network and act as digital gatekeepers, to break in and deploy a custom ransomware strain they call “SuperBlack.”

One of the vulnerabilities, tracked as CVE-2024-55591, has been exploited in cyberattacks to breach the corporate networks of Fortinet customers since December 2024. Forescout says a second bug, tracked as CVE-2025-24472, is also being exploited by Mora_001 in attacks. Fortinet released patches for both bugs in January. 

Sai Molige, senior manager of threat hunting at Forescout, told TechCrunch that the cybersecurity firm has “investigated three events in different companies, but we believe there could be others.”

In one confirmed intrusion, Forescout said it observed the attacker “selectively” encrypting file servers containing sensitive data. 

“The encryption was initiated only after data exfiltration, aligning with recent trends among ransomware operators who prioritize data theft over pure disruption,” said Molige. 

Forescout says the Mora_001 threat actor “exhibits a distinct operational signature,” which the firm says has “close ties” to the LockBit ransomware gang, which was last year disrupted by U.S. authorities. Molige said the SuperBlack ransomware is based on the leaked builder behind the malware used in LockBit 3.0 attacks, while a ransom note used by Mora_001 includes the same messaging address used by LockBit. 

“This connection could indicate that Mora_001 is either a current affiliate with unique operational methods or an associate group sharing communication channels,” Molige said. 

Stefan Hostetler, head of threat intelligence at cybersecurity firm Arctic Wolf, which previously observed exploitation of CVE-2024-55591, tells TechCrunch that Forescout’s findings suggest hackers are “going after the remaining organizations who were unable to apply the patch or harden their firewall configurations when the vulnerability was originally disclosed.”

Hostetler says the ransom note used in these attacks bears similarities to that of other groups, such as the now-defunct ALPHV/BlackCat ransomware gang

Fortinet did not respond to TechCrunch’s questions.

Carly Page is a Senior Reporter at TechCrunch, where she covers the cybersecurity beat. She has spent more than a decade in the technology industry, writing for titles including Forbes, TechRadar and WIRED.

You can contact Carly securely on Signal at +441536 853956 or via email at [email protected].

View Bio

Subscribe for the industry’s biggest tech news

Related


文章来源: https://techcrunch.com/2025/03/17/hackers-are-exploiting-fortinet-firewall-bugs-to-plant-ransomware/
如有侵权请联系:admin#unsafe.sh