Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Warlock Ransomware Exploits Unpatched SmarterMail Server

Warlock Ransomware Exploits Unpatched SmarterMail Server

Posted on February 10, 2026 By CWS

SmarterTools recently disclosed that the Warlock ransomware group, also known as Storm-2603, successfully infiltrated its network by taking advantage of a vulnerability in an unpatched SmarterMail server. The breach occurred on January 29, 2026, when an outdated mail server was compromised, as confirmed by Derek Curtis, the company’s Chief Commercial Officer.

Details of the Security Breach

According to Curtis, the company operated approximately 30 servers and virtual machines with SmarterMail installed. The breach was traced back to a virtual machine that had not been updated, which was set up by an employee. This oversight led to the compromise of the mail server and subsequent network breach. Despite this, SmarterTools assured that critical services such as their website, shopping cart, and account portal remained unaffected.

The attack impacted about 12 Windows servers and a secondary data center used for quality control. Tim Uzzanti, CEO of SmarterTools, noted that the ransomware primarily affected hosted customers using SmarterTrack, not due to any inherent flaw in SmarterTrack, but because the environment was less secure once the network was breached.

Vulnerability Exploitation and Impact

Warlock ransomware operators reportedly waited several days after gaining initial access to the network before seizing control of the Active Directory server, creating new users, and deploying additional malicious payloads like Velociraptor to encrypt files. Curtis explained that this delay in malicious activity led to some customers experiencing compromises despite updates being applied, as the initial breach had occurred earlier.

While the exact SmarterMail vulnerability exploited remains unidentified, known vulnerabilities such as CVE-2025-52691, CVE-2026-23760, and CVE-2026-24423 have been actively exploited. CVE-2026-23760, an authentication bypass flaw, and CVE-2026-24423, which allows remote code execution via the ConnectToHub API, were addressed in a recent software update.

Preventive Measures and Recommendations

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that the CVE-2026-24423 vulnerability is being leveraged in ransomware attacks. A report by cybersecurity firm ReliaQuest suggests that Warlock’s tactics involve abusing CVE-2026-23760 to stage the ransomware payload, including downloading a malicious MSI installer from Supabase for Velociraptor installation.

Security experts highlight that Warlock’s strategy of combining legitimate software features with vulnerabilities helps the attackers blend in with routine administrative operations, making detection more challenging. Users of SmarterMail are strongly encouraged to upgrade to the latest version (Build 9526) immediately and to isolate mail servers to prevent lateral movement of ransomware.

This incident underscores the critical need for regular software updates and vigilant network security practices to safeguard against evolving cyber threats.

The Hacker News Tags:Active Directory, CISA, CVE vulnerabilities, cyber attack, Cybersecurity, data security, Malware, network breach, ransomware attack, security flaws, SmarterMail server, SmarterTools, Velociraptor, vulnerability exploitation, Warlock ransomware

Post navigation

Previous Post: New Tool Identifies Quantum-Weak Cryptography
Next Post: Critical Security Flaw in BeyondTrust Products Patched

Related Posts

New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks The Hacker News
Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers The Hacker News
Microsoft Patches SharePoint Zero-Day and 168 Security Flaws Microsoft Patches SharePoint Zero-Day and 168 Security Flaws The Hacker News
Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises The Hacker News
PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks The Hacker News
ZiChatBot Malware Found in PyPI Packages Exploiting Zulip APIs ZiChatBot Malware Found in PyPI Packages Exploiting Zulip APIs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark