Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • Top 16 Most Exploited CVEs of 2025 – Critical Vulnerabilities Analysis
  • A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)
  • Kali Linux 2025.4 Released: New Tools, Wayland & Wifipumpkin3
  • India Rolls Back Sanchar Saathi Cybersecurity App: What It Means for Your Digital Safety
  • Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage
  • 5 Web Security Threats 2025 That Transformed Online Protection Forever
  • What Cyber Insurance Doesn’t Cover & How to Fix the Gaps
  • 5 Simple Hacks to Secure Your Personal Computer
Tuesday, December 16
Cyber infosCyber infos
X (Twitter) Instagram LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infosCyber infos
Cyber attacks

The Mora_001: A New Threat in the Ransomware Landscape

Cyber infosBy Cyber infosMarch 14, 2025Updated:March 14, 2025No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Email WhatsApp Copy Link
Follow Us
X (Twitter) Instagram LinkedIn WhatsApp Telegram Threads
The Mora_001: A New Threat in the Ransomware Landscape
Share
Facebook Twitter Pinterest Threads Copy Link

In the ever-changing landscape of cybersecurity, threats are continuously evolving, adapting, and discovering new pathways to exploit weaknesses.

Enter into Mora_001, a recently discovered threat actor that has rapidly gained a reputation for a methodical and sophisticated network compromise methodology.

Their weapon of choice? A tailor-made ransomware variant labeled “SuperBlack.” The usual ransomware attack this is not, this is a complex, multi-pronged attack that highlights the increasing sophistication of cybercriminals.

Table of Contents hide
1 The exploitation: a perfect storm of vulnerabilities
2 Resilience: Fusing Inertia with Digestion
3 SuperBlack Ransomware: A Wild Card Enemy
4 Infrastructure and Tools
5 Mitigations: Keeping One Step Ahead
6 Final Thoughts

The exploitation: a perfect storm of vulnerabilities

The campaign for Mora_001 starts with the exploitation of two important Fortinet CVEs: CVE-2024-55591 and CVE-2025-24472. These vulnerabilities, which have an impact on FortiOS versions below 7.0.16, could be exploited by unauthenticated adversaries to obtain super_admin privileges on affected devices whose management interfaces are exposed.

Even more concerning is how quickly Mora_001 weaponized these vulnerabilities. 96 hours after Fonzerelli’s easily-reproducible written proof-of-concept exploit entered public hands on January 27, 2025, researchers confirmed that at least two varieties of exploit were witnessed in the wild:

The jsconsole interface exploit: By taking advantage of the WebSocket vulnerability, this method employed an IP Spoofing attack, e.g., 127.0.0.1 or 8.8.8.8 to hide the attacker’s true identity.

Direct HTTPS Requests: A more basic method that addresses the same inherent vulnerability with less disguise.

This swift abuse showcases a sinister trend in which threat actors aren’t waiting weeks, or even days, to weaponise vulnerabilities. They’re doing it in hours.

Resilience: Fusing Inertia with Digestion

But once Mora_001 infiltrated a network, they didn’t just gain access — they made certain they could permanently maintain it. Their tactics of persistence were more imaginative.

Stealthy Admin Accounts: The attackers made local system administrator accounts with names intended to fit in with services running on the affected systems, like “forticloud-tech,” “fortigate-firewall,” and even a context-aware “adnimistrator,” misspelling “administrator.”

Automated Functions: Mora_001 configured daily scripted tasks designed to re-create the administrator accounts if deleted. For instance, a script would recreate a “forticloud-sync” user with super_admin permissions and a hardcoded password.

High Availability (HA) Exploitation: Attackers in HA configurations manipulated the synchronization process to spread and extend their malicious configuration on other firewalls that were part of an HA cluster.

This allowed the hacker to always regain access multiple ways, even when an organization discovered a backdoor and removed it.

Reconnaissance and Lateral Mobility

Once persistence was established, Mora_001 performed extensive reconnaissance with the help of FortiGate dashboards to collect environmental intel. They came to identify potential paths for lateral movement via the Status, Security, Network, and Users & Devices dashboards

In such environments, the threat actor created additional VPN user accounts with names similar to legitimate VPN accounts, except for minor variations — the addition of a digit at the end (e.g., “xxx1”). They were then placed in VPN user groups, allowing access to the network in the future, bypassing casual admin review.

Mora_001 used several techniques to move laterally:

Stolen VPN Credential: Compromised VPN credentials used to access internal networks

Propagation Through HA Configuration: Leverage HA to compromise other firewalls.

Auth Infrastructure Abuse: Attacking TACACS+ or RADIUS services integrated with Active Directory.

WMIC and SSH: Windows Management Instrumentation (WMIC), for remote discovery and execution on target systems, and SSH to attempt access to additional servers and network appliances.

SuperBlack Ransomware: A Wild Card Enemy

The ransomware being used by Mora_001, referred to as SuperBlack, is very similar to LockBit 3.0 (also known as LockBit Black) but it has some important differences.

Ransom Note Structure: The ransom note contains a Tox chat ID previously associated with LockBit 3.0 activity, dropping more prominent branding facets and complicating attribution.

Custom Data Exfiltration: SuperBlack is bundled with its own executable for data exfiltration, indicating the attackers are trying to steal as much sensitive data as they can before encrypting it.

Despite these differences, these lightweight mechanisms keep the ransomware well integrated into the LockBit ecosystem, hinting that Mora_001 is an active or ex-LockBit affiliate or an independent actor recycling LockBit’s infrastructure.

Infrastructure and Tools

The activities of Mora_001 have been correlated with relevant infrastructure such as IP address 185.147.124.34, this was seen performing brute force attempts on numerous edge services. This IP hosts a tool called “VPN Brute v1. 0. 2,” a Russian-language tool specifically designed to brute force credentials for several VPN services and edge devices.

The VPN Brute tool aims at platforms such as:

  • RDWeb (Remote Desktop Web Access)
  • PulseSecure
  • Outlook Web Access (OWA)
  • GlobalProtect by Palo Alto Networks
  • Fortinet, Cisco, F5 Networks BIG-IP, and Citrix

The latest variants of this tool also have added features like the ability to continue brute forcing after a valid credential has been found and honeypot detection.

Mitigations: Keeping One Step Ahead

To safeguard against Mora_001 and analogous threats, organizations must focus on the following:

Patch Vulnerable Systems: Apply FortiOS updates addressing CVE-2024-55591 and CVE-2025-24472. Restrict Management Access: Disable external management interfaces when not in use. Audit Administrator Accounts: Keep a regular check and delete unauthorized users.

Examine Automation Settings: Pay special attention to suspicious tasks, sometimes scheduled daily or during off-hours.

Review VPN Users and Groups: Examine slight variations of legitimate usernames and accounts created recently.

Enable comprehensive Logging: Make sure CLI audit logs, HTTP/S traffic logs, and authentication system auditing are executed.

Final Thoughts

A Cybersecurity Wake-Up Call The Mora_001 campaign is a reminder that modern cybercriminals are legitimate and do not want to be left behind.

The second wave of ransomware-infected encrypted VPN data, selective data theft, and single-file encryption may appear to threat actors from a compromised server in a secure location.

For organizations, the message is clear, Deploy in a timely manner, monitor for full encryption and defend the line. Continue your cybersecurity strategy when threat investors do something. The stakes are still higher, and the time to influence is now.

Follow on X (Twitter) Follow on Instagram Follow on LinkedIn Follow on WhatsApp Follow on Threads
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleNew Microsoft Copilot Scam Is Stealing Logins – What You Need to Know!
Next Article Black Basta Ransomware: How the BRUTED Framework Exploits Edge Devices in 2025
Cyber infos
  • Website

Related Posts

Securing AI Models Against Adversarial Attacks

February 6, 2025
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

India Rolls Back Sanchar Saathi Cybersecurity App: What It Means for Your Digital Safety

December 7, 2025

Android Users Warned: New Sturnus Malware Can Read Your Chats & Empty Your Bank

November 24, 2025

Android Photo Frames Malware: A Hidden Threat to Your Home Network

November 15, 2025

Google Maps Review Extortion: New Feature Lets Businesses Report Fake Reviews and Scams

November 9, 2025

Top 10

Top 10 Best Autonomous Endpoint Management Tools in 2025

November 14, 2025

mobile security

How to Prevent SIM Swap Attacks and Protect Your Mobile Number

February 23, 2025

How to Recover Lost Data from a Compromised Smartphone – Complete Guide

February 22, 2025

Are AI-Generated Passwords More Secure than Human-Created Ones?

February 13, 2025

Selling Your Phone? Follow This Guide to Ensure Your Data is 100% Gone!

February 9, 2025
Archives
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2025

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2025

November 26, 2025
Recents

Top 16 Most Exploited CVEs of 2025 – Critical Vulnerabilities Analysis

December 15, 2025

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Kali Linux 2025.4 Released: New Tools, Wayland & Wifipumpkin3

December 13, 2025

India Rolls Back Sanchar Saathi Cybersecurity App: What It Means for Your Digital Safety

December 7, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

X (Twitter) Instagram Pinterest LinkedIn WhatsApp Threads
  • Contact us
  • Sitemaps
© 2025 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.