SmarterTools recently confirmed that the Warlock ransomware group breached its network on January 29, 2026, by exploiting an unpatched SmarterMail instance on a forgotten virtual machine. While the company's core web services and customer data remained secure, the attackers successfully compromised 12 Windows servers and a quality control data center, primarily affecting hosted SmarterTrack customers.
SmarterTools disclosed that the breach originated from a single mail server that an employee had set up but failed to update, providing an entry point for the Warlock gang, also known as Storm-2603. Although the company emphasized that its main website, shopping portal, and account data were not compromised, the attackers managed to move laterally through the network. This was particularly effective against the SmarterTrack environment, which was more accessible once the initial perimeter was breached. The incident highlights the danger of "shadow IT" and the risks posed by even a single unmanaged asset within an otherwise secured infrastructure.
The attackers utilized a strategic approach, gaining initial access and waiting several days before taking control of the Active Directory server and creating new user accounts. During this period, they deployed tools like Velociraptor and a locker to encrypt files across the network. This delay explains why some systems were compromised even after they were eventually updated, as the initial breach had already occurred. The group effectively leveraged the time between infiltration and execution to ensure they had a firm foothold before triggering the ransomware payload.
Recent reports from cybersecurity firms indicate that the attackers likely exploited CVE-2026-23760, an authentication bypass flaw that allows for the resetting of administrator passwords via crafted HTTP requests. By chaining this bypass with legitimate software features like volume mounting, the Warlock group gained full system control while blending in with normal administrative workflows. This method proved more effective for staying under the radar than using more direct but "noisy" remote code execution vulnerabilities, such as CVE-2026-24423, which CISA has also flagged as being under active exploitation.
Technical analysis reveals that the attackers downloaded malicious installers from legitimate cloud platforms to maintain their presence on internet-facing systems. By using Velociraptor, a legitimate digital forensics tool, for malicious purposes, the group was able to maintain access and prepare for the final encryption phase. Security researchers noted that this rapid weaponization of vendor fixes demonstrates how quickly ransomware operators can analyze patches and develop exploits to target organizations that are slow to update their software.
In response to the surge in attacks, which included over 1,000 exploitation attempts shortly after the vulnerabilities were disclosed, SmarterTools and security experts are urging all users to upgrade to SmarterMail Build 9526 immediately. Beyond patching, organizations are advised to isolate their mail servers to prevent the lateral movement that allowed the Warlock group to transition from a single vulnerable VM to the broader corporate network. The incident serves as a stark reminder of the critical need for comprehensive asset management and rapid patch deployment in the face of evolving cyber threats.
Source: Warlock Ransomware Breaches SmarterTools via Unpatched SmarterMail Server


