By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server
Computing

Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server

News Room
Last updated: 2026/02/10 at 7:03 AM
News Room Published 10 February 2026
Share
Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server
SHARE

SmarterTools confirmed last week that the Warlock (aka Storm-2603) ransomware gang breached its network by exploiting an unpatched SmarterMail instance.

The incident took place on January 29, 2026, when a mail server that was not updated to the latest version was compromised, the company’s Chief Commercial Officer, Derek Curtis, said.

“Prior to the breach, we had approximately 30 servers/VMs with SmarterMail installed throughout our network,” Curtis explained. “Unfortunately, we were unaware of one VM, set up by an employee, that was not being updated. As a result, that mail server was compromised, which led to the breach.”

However, SmarterTools emphasized that the breach did not affect its website, shopping cart, My Account portal, and several other services, and that no business applications or account data were affected or compromised.

About 12 Windows servers on the company’s office network, as well as a secondary data center used for quality control (QC) tests, are confirmed to be affected. According to its CEO, Tim Uzzanti, the “attempted ransomware attack” also impacted hosted customers using SmarterTrack.

“Hosted customers using SmarterTrack were the most affected,” Uzzanti said in a different Community Portal threat. “This was not due to any issue within SmarterTrack itself, but rather because that environment was more easily accessible than others once they breached our network.”

Furthermore, SmarterTools acknowledged that the Warlock group waited for a couple of days after gaining initial access to take control of the Active Directory server and create new users, followed by dropping additional payloads like Velociraptor and the locker to encrypt files.

“Once these bad actors gain access, they typically install files and wait approximately 6–7 days before taking further action,” Curtis said. “This explains why some customers experienced a compromise even after updating — the initial breach occurred prior to the update, but malicious activity was triggered later.”

It’s currently not clear which SmarterMail vulnerability was weaponized by attackers, but it’s worth noting that multiple flaws in the email software – CVE-2025-52691 (CVSS score: 10.0), CVE-2026-23760, and CVE-2026-24423 (CVSS scores: 9.3) – have come under active exploitation in the wild.

CVE-2026-23760 is an authentication bypass flaw that could allow any user to reset the SmarterMail system administrator password by sending a specially crafted HTTP request. CVE-2026-24423, on the other hand, exploits a weakness in the ConnectToHub API method to achieve unauthenticated remote code execution (RCE).

The vulnerabilities were addressed by SmarterTools in build 9511. Last week, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed that CVE-2026-24423 was being exploited in ransomware attacks.

In a report published Monday, cybersecurity company ReliaQuest said it identified activity likely linked to Warlock that involved the abuse of CVE-2026-23760 to bypass authentication and stage the ransomware payload on internet-facing systems. The attack also leverages the initial access to download a malicious MSI installer (“v4.msi”) from Supabase, a legitimate cloud-based backend platform, to install Velociraptor.

“While this vulnerability allows attackers to bypass authentication and reset administrator passwords, Storm-2603 chains this access with the software’s built-in ‘Volume Mount’ feature to gain full system control,” security researcher Alexa Feminella said. “Upon entry, the group installs Velociraptor, a legitimate digital forensics tool it has used in previous campaigns, to maintain access and set the stage for ransomware.”

The security outfit also noted that the two vulnerabilities have the same net result: while CVE-2026-23760 grants unauthenticated administrative access via the password reset API, which can then be combined with the mounting logic to attain code execution, CVE-2026-24423 offers a more direct path to code execution through an API path.

The fact that the attackers are pursuing the former method is an indication that it likely allows the malicious activity to blend in with typical administrative workflows, helping them avoid detection.

“By abusing legitimate features (password resets and drive mounting) instead of relying solely on a single ‘noisy’ exploit primitive, operators may reduce the effectiveness of detections tuned specifically for known RCE patterns,” Feminella added. “This pace of weaponization is consistent with ransomware operators rapidly analyzing vendor fixes and developing working tradecraft shortly after release.”

Users of SmarterMail are advised to upgrade to the latest version (Build 9526) with immediate effect for optimal protection, and isolate mail servers to block lateral movement attempts used to deploy ransomware.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article BellSoft Survey Finds Container Security Practices Are Undermining Developers’ Own Goals BellSoft Survey Finds Container Security Practices Are Undermining Developers’ Own Goals
Next Article Ruko U11MINI 4K (RC3): the pocket-sized drone with advanced features Ruko U11MINI 4K (RC3): the pocket-sized drone with advanced features
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Google’s Still Rewarding Low-Quality Sites (What Gives?) | WordStream
Google’s Still Rewarding Low-Quality Sites (What Gives?) | WordStream
Computing
Discord starts age verification with face scans and ID – but is it safe?
Discord starts age verification with face scans and ID – but is it safe?
News
Zero-Trust Data Warehousing for Agentic AI: Why Trusting the Pipeline No Longer Scales | HackerNoon
Zero-Trust Data Warehousing for Agentic AI: Why Trusting the Pipeline No Longer Scales | HackerNoon
Computing
Windsurf Introduces Arena Mode to Compare AI Models During Development
Windsurf Introduces Arena Mode to Compare AI Models During Development
News

You Might also Like

Google’s Still Rewarding Low-Quality Sites (What Gives?) | WordStream
Computing

Google’s Still Rewarding Low-Quality Sites (What Gives?) | WordStream

11 Min Read
Zero-Trust Data Warehousing for Agentic AI: Why Trusting the Pipeline No Longer Scales | HackerNoon
Computing

Zero-Trust Data Warehousing for Agentic AI: Why Trusting the Pipeline No Longer Scales | HackerNoon

10 Min Read
From Ransomware to Residency: Inside the Rise of the Digital Parasite
Computing

From Ransomware to Residency: Inside the Rise of the Digital Parasite

11 Min Read
Former GitHub CEO launches new developer platform with huge M seed round
Computing

Former GitHub CEO launches new developer platform with huge $60M seed round

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?