Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

SuperBlack ransomware may have ties to LockBit | Computer Weekly

By Computer Weekly by By Computer Weekly
March 13, 2025
Home Uncategorized
Share on FacebookShare on Twitter


An emergent ransomware gang that has been exploiting two vulnerabilities in Fortinet firewall appliances may have links to current or former members of the notorious LockBit operation, according to intelligence published this week by Forescout Research’s Vedere Labs unit.

Forescout is attributing SuperBlack to a threat actor tracked as Mora_001, which exhibits a distinct operational signature blending opportunistic attacks with ties to the LockBit ecosystem, according to researcher Sai Molige.

“Mora_001’s relationship to the broader Lockbit’s ransomware operations underscore the increased complexity of the modern ransomware landscape – where specialised teams collaborate to leverage complementary capabilities,” wrote Molige and the research team.

Mora_001/SuperBlack’s modus operandi to date has been to focus attention on CVE-2025-24472 and CVE-2024-55591 – a pair of authentication bypass flaws discovered in Fortinet’s FortiOS and FortiProxy – for initial access.

These vulnerabilities enable an unauthenticated actor to gain heightened admin rights on devices running FortiOS with exposed management interfaces. A proof-of-concept exploit released on 27 January 2025 was exploited within 96 hours, said Forescout.

Once in their target network, the gang moved laterally and prioritised targets such as authentication, database and file servers, domain controllers, and other elements of their victims’ network infrastructure. They then exfiltrated data and initiated encryption after doing so in a fairly standard ransomware attack.

Pattern recognition

In linking Mora_001/SuperBlack to LockBit – famously disrupted in a UK-led multinational operation just over 12 months ago – Forescout’s analysts said they observed a number of post-exploitation behaviours consistent with LockBit’s playbook.

These included identical usernames on victim networks, overlapping IP addresses used for access and command and control (C2), similar configuration backup behaviours, and rapid ransomware deployment, often after just 48 hours under “favourable” conditions.

Mora_001/SuperBlack also leveraged the leaked LockBit builder, removing LockBit branding from its ransom notes and deploying its own exfiltration tool.

The most concrete evidence was to be found in the gang’s ransom note, which includes a TOX ID used by LockBit for negotiations. Forescout said this suggested Mora_001 is either an operational affiliate of LockBit, or an associate group that shares communications channels with the gang.

“The post-exploitation patterns observed enabled us to define a unique operational signature that sets Mora_001 apart from other ransomware operators, including LockBit affiliates,” wrote the team. “This consistent operational framework suggests a distinct threat actor with a structured playbook, rather than multiple operators following a generalised LockBit methodology.”

In analysing the timeline of Mora_001/SuperBlack intrusions, as well as overlapping indicators and operational patterns, Forescout said it could now “confidently” attribute future intrusions to the gang, independently of what its exact relationship to LockBit may be.

Following the National Crime Agency (NCA)-led Operation Cronos, which disrupted LockBit in February 2024, the ransomware landscape saw a significant fragmentation, and an increase in the number of operational gangs, suggesting that a number of members of the LockBit collective scattered under pressure and set up or joined new operations.

Although these suggestions are merely theories, the discovery of Mora_001/SuperBlack lends a certain weight to them, and as the year progresses, the legacy of LockBit looks set to remain for some time to come.

More information on Mora_001/SuperBlack, including tactics, techniques and procedures (TTPs), detection opportunities, and indicators of compromise (IoCs), can be obtained from Forescout.



Source link

By Computer Weekly

By Computer Weekly

Next Post
5 questions to ask before deploying agentic AI

5 questions to ask before deploying agentic AI

Recommended.

Watching the watchers: Is the Technical Advisory Panel a match for MI5, MI6 and GCHQ? | Computer Weekly

Watching the watchers: Is the Technical Advisory Panel a match for MI5, MI6 and GCHQ? | Computer Weekly

August 11, 2025
Huawei Unveils All-New Xinghe Intelligent Network Offerings for Northern Africa

Huawei Unveils All-New Xinghe Intelligent Network Offerings for Northern Africa

April 18, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio