SmarterTools confirmed final week that the Warlock (aka Storm-2603) ransomware gang breached its community by exploiting an unpatched SmarterMail occasion.
The incident passed off on January 29, 2026, when a mail server that was not up to date to the most recent model was compromised, the corporate’s Chief Industrial Officer, Derek Curtis, stated.
“Prior to the breach, we had approximately 30 servers/VMs with SmarterMail installed throughout our network,” Curtis defined. “Unfortunately, we were unaware of one VM, set up by an employee, that was not being updated. As a result, that mail server was compromised, which led to the breach.”
Nonetheless, SmarterTools emphasised that the breach didn’t have an effect on its web site, buying cart, My Account portal, and several other different providers, and that no enterprise functions or account knowledge had been affected or compromised.
About 12 Home windows servers on the corporate’s workplace community, in addition to a secondary knowledge middle used for high quality management (QC) exams, are confirmed to be affected. In keeping with its CEO, Tim Uzzanti, the “attempted ransomware attack” additionally impacted hosted prospects utilizing SmarterTrack.
“Hosted customers using SmarterTrack were the most affected,” Uzzanti stated in a distinct Group Portal risk. “This was not due to any issue within SmarterTrack itself, but rather because that environment was more easily accessible than others once they breached our network.”
Moreover, SmarterTools acknowledged that the Warlock group waited for a few days after gaining preliminary entry to take management of the Energetic Listing server and create new customers, adopted by dropping further payloads like Velociraptor and the locker to encrypt information.
“Once these bad actors gain access, they typically install files and wait approximately 6–7 days before taking further action,” Curtis stated. “This explains why some customers experienced a compromise even after updating — the initial breach occurred prior to the update, but malicious activity was triggered later.”
It is at the moment not clear which SmarterMail vulnerability was weaponized by attackers, nevertheless it’s price noting that a number of flaws within the e-mail software program – CVE-2025-52691 (CVSS rating: 10.0), CVE-2026-23760, and CVE-2026-24423 (CVSS scores: 9.3) – have come below energetic exploitation within the wild.
CVE-2026-23760 is an authentication bypass flaw that would permit any consumer to reset the SmarterMail system administrator password by sending a specifically crafted HTTP request. CVE-2026-24423, however, exploits a weak point within the ConnectToHub API methodology to realize unauthenticated distant code execution (RCE).
The vulnerabilities had been addressed by SmarterTools in construct 9511. Final week, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) confirmed that CVE-2026-24423 was being exploited in ransomware assaults.
In a report revealed Monday, cybersecurity firm ReliaQuest stated it recognized exercise possible linked to Warlock that concerned the abuse of CVE-2026-23760 to bypass authentication and stage the ransomware payload on internet-facing programs. The assault additionally leverages the preliminary entry to obtain a malicious MSI installer (“v4.msi”) from Supabase, a reliable cloud-based backend platform, to put in Velociraptor.
“While this vulnerability allows attackers to bypass authentication and reset administrator passwords, Storm-2603 chains this access with the software’s built-in ‘Volume Mount’ feature to gain full system control,” safety researcher Alexa Feminella stated. “Upon entry, the group installs Velociraptor, a legitimate digital forensics tool it has used in previous campaigns, to maintain access and set the stage for ransomware.”
The safety outfit additionally famous that the 2 vulnerabilities have the identical internet consequence: whereas CVE-2026-23760 grants unauthenticated administrative entry by way of the password reset API, which may then be mixed with the mounting logic to realize code execution, CVE-2026-24423 provides a extra direct path to code execution by an API path.
The truth that the attackers are pursuing the previous methodology is a sign that it possible permits the malicious exercise to mix in with typical administrative workflows, serving to them keep away from detection.
“By abusing legitimate features (password resets and drive mounting) instead of relying solely on a single ‘noisy’ exploit primitive, operators may reduce the effectiveness of detections tuned specifically for known RCE patterns,” Feminella added. “This pace of weaponization is consistent with ransomware operators rapidly analyzing vendor fixes and developing working tradecraft shortly after release.”
Customers of SmarterMail are suggested to improve to the most recent model (Construct 9526) with rapid impact for optimum safety, and isolate mail servers to dam lateral motion makes an attempt used to deploy ransomware.



