Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
    Cybersecurity

    Ransomware group breached SmarterTools via flaw in its SmarterMail deployment

    adminBy adminFebruary 9, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
    Share
    Facebook Twitter LinkedIn Pinterest Email

    SmarterTools, the company behind the popular Microsoft Exchange alternative SmarterMail, has been breached by a ransomware-wielding group that leveraged a recently fixed vulnerability in that solution.

    SmarterTools breach

    How did the SmarterTools breach happen?

    Derek Curtis, the firm’s Chief Operating Officer, said that the breach happened on January 29, 2026.

    “Prior to the breach, we had approximately 30 servers/VMs with SmarterMail installed throughout our network. Unfortunately, we were unaware of one VM, set up by an employee, that was not being updated. As a result, that mail server was compromised, which led to the breach,” he shared last week.

    The attack ended up affecting the company’s office network and a network at a datacenter hosting labs for quality control work.

    “At the data center, we hosted our Portal as well as our Hosted SmarterTrack network, which was connected via Active Directory. We didn’t see much affected there and, out of an abundance of caution, we restored some of those servers from the most recent backup, which was six hours old,” he added.

    “Because we are primarily a Linux company now, only about 12 Windows servers looked to be compromised and on those servers, our virus scanners blocked most efforts. None of the Linux servers were affected. None of our business applications or account data were affected or compromised.”

    In the aftermath of the attack, the company eliminated Windows from their networks, stopped using Active Directory services, and have changed passwords throughout their network.

    The attackers’ TTPs

    Curtis did not share which vulnerability was exploited by the attackers, but CVE-2026-24423 seems like a likely candidate: the flaw was added to CISA’s Known Exploited Vulnerabilities catalog on February 5, 2026, and marked as “Exploited in ransomware attacks“.

    (Two other SmarterMail vulnerabilities were added to the same catalog in late January, but those are not known to be leveraged in ransomware attacks.)

    What he did share is that the group behind the “hit” is the Warlock group (aka Gold Salem, aka Storm-2603), which has been targeting a wide variety of organizations, mostly in North America, Europe, and South America.

    The group uses the Warlock ransomware and double extortion tactics.

    “Once these bad actors gain access, they typically install files and wait approximately 6–7 days before taking further action. This explains why some customers experienced a compromise even after updating—the initial breach occurred prior to the update, but malicious activity was triggered later,” Curtis explained.

    “They often attempt to take control of the Active Directory server and create new users. From there, they distribute files across Windows machines and attempt to execute files that encrypt data.”

    Curtis shared other tactics, techniques, and procedures (TTPs) used by the group: common file names and folders, and common programs leveraged (e.g., Velociraptor, SimpleHelp, WinRAR, etc.)

    “It is also important to note that CVEs are being discovered across many different products. Some groups install legitimate-looking applications on servers and later exploit. For example, the Warlock Group frequently targets CVE’s in SharePoint and Veeam and has now targeted SmarterMail. Recent Notepad++ update vulnerabilities are another example of how trusted applications can be leveraged to further exploit systems, servers, and desktops,” he added.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    breached deployment Flaw Group ransomware SmarterMail SmarterTools
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article60+ Creative March Marketing Ideas (With Examples!)
    Next Article I finally replaced Lucidchart with this private self hosted dashboard and I am never going back
    admin
    • Website

    Related Posts

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    Pro-Russia actors team with Iran-linked hackers in attacks

    March 3, 2026

    LexisNexis confirms data breach as hackers leak stolen files

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026

    SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)

    March 3, 2026

    I finally have full control of my Bambu Lab printer, but it meant ditching Bambu’s cloud

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (581)
    • Privacy & Online Earning (83)
    • SEO & Digital Marketing (364)
    • Tech Tools & Mobile / Apps (717)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026

    SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)

    March 3, 2026
    Most Popular
    • Fig Security emerges from stealth with $38 million to resilience-proof enterprise security
    • EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches
    • SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)
    • I finally have full control of my Bambu Lab printer, but it meant ditching Bambu’s cloud
    • Pro-Russia actors team with Iran-linked hackers in attacks
    • 8 Best Student Checking Accounts of March 2026
    • Builderius WordPress Page Builder Integrates Claude AI
    • Google is cutting Chrome’s release cycle in half
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.