Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Warlock Ransomware Exploits Unpatched SmarterMail Server

Warlock Ransomware Exploits Unpatched SmarterMail Server

Posted on February 10, 2026 By CWS

SmarterTools recently disclosed that the Warlock ransomware group, also known as Storm-2603, successfully infiltrated its network by taking advantage of a vulnerability in an unpatched SmarterMail server. The breach occurred on January 29, 2026, when an outdated mail server was compromised, as confirmed by Derek Curtis, the company’s Chief Commercial Officer.

Details of the Security Breach

According to Curtis, the company operated approximately 30 servers and virtual machines with SmarterMail installed. The breach was traced back to a virtual machine that had not been updated, which was set up by an employee. This oversight led to the compromise of the mail server and subsequent network breach. Despite this, SmarterTools assured that critical services such as their website, shopping cart, and account portal remained unaffected.

The attack impacted about 12 Windows servers and a secondary data center used for quality control. Tim Uzzanti, CEO of SmarterTools, noted that the ransomware primarily affected hosted customers using SmarterTrack, not due to any inherent flaw in SmarterTrack, but because the environment was less secure once the network was breached.

Vulnerability Exploitation and Impact

Warlock ransomware operators reportedly waited several days after gaining initial access to the network before seizing control of the Active Directory server, creating new users, and deploying additional malicious payloads like Velociraptor to encrypt files. Curtis explained that this delay in malicious activity led to some customers experiencing compromises despite updates being applied, as the initial breach had occurred earlier.

While the exact SmarterMail vulnerability exploited remains unidentified, known vulnerabilities such as CVE-2025-52691, CVE-2026-23760, and CVE-2026-24423 have been actively exploited. CVE-2026-23760, an authentication bypass flaw, and CVE-2026-24423, which allows remote code execution via the ConnectToHub API, were addressed in a recent software update.

Preventive Measures and Recommendations

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that the CVE-2026-24423 vulnerability is being leveraged in ransomware attacks. A report by cybersecurity firm ReliaQuest suggests that Warlock’s tactics involve abusing CVE-2026-23760 to stage the ransomware payload, including downloading a malicious MSI installer from Supabase for Velociraptor installation.

Security experts highlight that Warlock’s strategy of combining legitimate software features with vulnerabilities helps the attackers blend in with routine administrative operations, making detection more challenging. Users of SmarterMail are strongly encouraged to upgrade to the latest version (Build 9526) immediately and to isolate mail servers to prevent lateral movement of ransomware.

This incident underscores the critical need for regular software updates and vigilant network security practices to safeguard against evolving cyber threats.

The Hacker News Tags:Active Directory, CISA, CVE vulnerabilities, cyber attack, Cybersecurity, data security, Malware, network breach, ransomware attack, security flaws, SmarterMail server, SmarterTools, Velociraptor, vulnerability exploitation, Warlock ransomware

Post navigation

Previous Post: New Tool Identifies Quantum-Weak Cryptography
Next Post: Critical Security Flaw in BeyondTrust Products Patched

Related Posts

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign The Hacker News
Google Enhances Chrome Security with DBSC Rollout Google Enhances Chrome Security with DBSC Rollout The Hacker News
Microsoft’s AI MDASH System Detects 16 Windows Vulnerabilities Microsoft’s AI MDASH System Detects 16 Windows Vulnerabilities The Hacker News
Apple Enhances Security for Older iOS Devices Against Exploits Apple Enhances Security for Older iOS Devices Against Exploits The Hacker News
Ghost Identities, Poisoned Accounts, & AI Agent Havoc Ghost Identities, Poisoned Accounts, & AI Agent Havoc The Hacker News
Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark