Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Warlock Ransomware Exploits Unpatched SmarterMail Server

Warlock Ransomware Exploits Unpatched SmarterMail Server

Posted on February 10, 2026 By CWS

SmarterTools recently disclosed that the Warlock ransomware group, also known as Storm-2603, successfully infiltrated its network by taking advantage of a vulnerability in an unpatched SmarterMail server. The breach occurred on January 29, 2026, when an outdated mail server was compromised, as confirmed by Derek Curtis, the company’s Chief Commercial Officer.

Details of the Security Breach

According to Curtis, the company operated approximately 30 servers and virtual machines with SmarterMail installed. The breach was traced back to a virtual machine that had not been updated, which was set up by an employee. This oversight led to the compromise of the mail server and subsequent network breach. Despite this, SmarterTools assured that critical services such as their website, shopping cart, and account portal remained unaffected.

The attack impacted about 12 Windows servers and a secondary data center used for quality control. Tim Uzzanti, CEO of SmarterTools, noted that the ransomware primarily affected hosted customers using SmarterTrack, not due to any inherent flaw in SmarterTrack, but because the environment was less secure once the network was breached.

Vulnerability Exploitation and Impact

Warlock ransomware operators reportedly waited several days after gaining initial access to the network before seizing control of the Active Directory server, creating new users, and deploying additional malicious payloads like Velociraptor to encrypt files. Curtis explained that this delay in malicious activity led to some customers experiencing compromises despite updates being applied, as the initial breach had occurred earlier.

While the exact SmarterMail vulnerability exploited remains unidentified, known vulnerabilities such as CVE-2025-52691, CVE-2026-23760, and CVE-2026-24423 have been actively exploited. CVE-2026-23760, an authentication bypass flaw, and CVE-2026-24423, which allows remote code execution via the ConnectToHub API, were addressed in a recent software update.

Preventive Measures and Recommendations

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that the CVE-2026-24423 vulnerability is being leveraged in ransomware attacks. A report by cybersecurity firm ReliaQuest suggests that Warlock’s tactics involve abusing CVE-2026-23760 to stage the ransomware payload, including downloading a malicious MSI installer from Supabase for Velociraptor installation.

Security experts highlight that Warlock’s strategy of combining legitimate software features with vulnerabilities helps the attackers blend in with routine administrative operations, making detection more challenging. Users of SmarterMail are strongly encouraged to upgrade to the latest version (Build 9526) immediately and to isolate mail servers to prevent lateral movement of ransomware.

This incident underscores the critical need for regular software updates and vigilant network security practices to safeguard against evolving cyber threats.

The Hacker News Tags:Active Directory, CISA, CVE vulnerabilities, cyber attack, Cybersecurity, data security, Malware, network breach, ransomware attack, security flaws, SmarterMail server, SmarterTools, Velociraptor, vulnerability exploitation, Warlock ransomware

Post navigation

Previous Post: New Tool Identifies Quantum-Weak Cryptography
Next Post: Critical Security Flaw in BeyondTrust Products Patched

Related Posts

Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions The Hacker News
How to Assess and Choose the Right AI-SOC Platform How to Assess and Choose the Right AI-SOC Platform The Hacker News
Apple Patches CVE-2025-43300 Zero-Day in iOS, iPadOS, and macOS Exploited in Targeted Attacks Apple Patches CVE-2025-43300 Zero-Day in iOS, iPadOS, and macOS Exploited in Targeted Attacks The Hacker News
AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar The Hacker News
Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware The Hacker News
Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Ransomware Threats BQTLock and GREENBLOOD Emerge
  • Ivanti Releases Crucial Patches for Endpoint Manager
  • Cybercriminals Exploit AI to Distribute macOS Malware
  • Microsoft to Update Windows Secure Boot in 2026
  • Critical SandboxJS Flaw Raises Security Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Ransomware Threats BQTLock and GREENBLOOD Emerge
  • Ivanti Releases Crucial Patches for Endpoint Manager
  • Cybercriminals Exploit AI to Distribute macOS Malware
  • Microsoft to Update Windows Secure Boot in 2026
  • Critical SandboxJS Flaw Raises Security Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark