Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Warlock ransomware infiltrates SmarterTools through unpatched SmarterMail servers

EU launches €2.5 billion NanoIC semiconductor manufacturing facility

Development of rare earth free magnets for renewable energy and mobility

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Warlock ransomware infiltrates SmarterTools through unpatched SmarterMail servers
Identity

Warlock ransomware infiltrates SmarterTools through unpatched SmarterMail servers

userBy userFebruary 10, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Last week, SmarterTools confirmed that the Warlock (aka Storm-2603) ransomware group exploited unpatched SmarterMail instances to infiltrate networks.

Derek Curtis, the company’s chief commercial officer, said the incident occurred on January 29, 2026, when an email server that had not been updated to the latest version was compromised.

“Prior to the breach, we had approximately 30 servers/VMs with SmarterMail installed across our network,” Curtis explained. “Unfortunately, we were unaware that one VM that was set up by an employee had not been updated, which resulted in its email server being compromised, which led to the breach.”

However, SmarterTools emphasized that the breach did not affect its website, shopping cart, My Account portal, or several other services, and no business applications or account data were affected or compromised.

Approximately 12 Windows servers on the company’s office network and a secondary data center used for quality control (QC) testing have been confirmed to be affected. CEO Tim Usanti said the “attempted ransomware attack” also affected host customers using SmarterTrack.

“Host customers using SmarterTrack were most affected,” Uzanti said in another community portal threat. “This was not due to an issue with SmarterTrack itself, but rather because that environment was easier to access than others once it entered our network.”

Additionally, SmarterTools admitted that after the Warlock group gained initial access, it waited several days to gain control of the Active Directory server and create new users, and then dropped additional payloads such as Velociraptor and Locker to encrypt files.

“Once these attackers gain access, they typically install files and wait approximately six to seven days before taking further action,” Curtis said. “This explains why some customers encountered breaches even after updating. The initial breach occurred before the update, but the malicious activity was triggered later.”

Although it is currently unclear which vulnerabilities in SmarterMail were weaponized by attackers, it is worth noting that multiple flaws in the email software have been exploited in the wild: CVE-2025-52691 (CVSS score: 10.0), CVE-2026-23760, and CVE-2026-24423 (CVSS score: 9.3).

CVE-2026-23760 is an authentication bypass flaw that could allow arbitrary users to reset the password of a SmarterMail system administrator by sending a specially crafted HTTP request. CVE-2026-24423, on the other hand, exploits a weakness in the ConnectToHub API method to enable unauthenticated remote code execution (RCE).

This vulnerability was addressed in SmarterTools build 9511. Last week, the US Cybersecurity and Infrastructure Security Agency (CISA) confirmed that CVE-2026-24423 was being exploited in ransomware attacks.

In a report released Monday, cybersecurity firm ReliaQuest said it had identified activity potentially related to Warlock, including the exploitation of CVE-2026-23760 to bypass authentication and stage ransomware payloads on internet-connected systems. The attack uses initial access to download a malicious MSI installer (‘v4.msi’) from Supabase, a legitimate cloud-based backend platform, and install Velociraptor.

“This vulnerability allows an attacker to bypass authentication and reset the administrator password, but Storm-2603 chains this access with the software’s built-in ‘volume mount’ functionality to take full control of the system,” said security researcher Alexa Femminella. “During the breach, the group installs Velociraptor, a legitimate digital forensics tool used in previous campaigns, to maintain access and prepare for ransomware.”

The security community also points out that the two vulnerabilities ultimately have the same outcome. CVE-2026-23760 allows unauthenticated administrative access via the password reset API, which can be combined with mounting logic to execute code, whereas CVE-2026-24423 provides a more direct path to code execution via the API path.

The fact that attackers are pursuing the former method indicates that it likely allows malicious activity to blend into common administrative workflows and evade detection.

“By exploiting legitimate functionality (resetting a password or mounting a drive), rather than relying solely on a single ‘noisy’ exploit primitive, operators can reduce the effectiveness of detections specifically tailored to known RCE patterns,” Femminella added. “This pace of weaponization is consistent with ransomware operators quickly analyzing vendor fixes and developing working techniques shortly after release.”

SmarterMail users are encouraged to immediately upgrade to the latest version (build 9526) for optimal protection and to isolate their email servers to block lateral movement attempts used to deploy ransomware.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEU launches €2.5 billion NanoIC semiconductor manufacturing facility
user
  • Website

Related Posts

Dutch authorities confirm Ivanti zero-day exploit exposed employee contact data

February 10, 2026

Fortinet patches critical SQLi flaw that allows unauthenticated code execution

February 10, 2026

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Warlock ransomware infiltrates SmarterTools through unpatched SmarterMail servers

EU launches €2.5 billion NanoIC semiconductor manufacturing facility

Development of rare earth free magnets for renewable energy and mobility

Dutch authorities confirm Ivanti zero-day exploit exposed employee contact data

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.