Skip to main content
WebDNS
Email Security

SmarterMail Breached by Ransomware Group Exploiting Its Own Vulnerabilities

3 min read ·
SmarterMail Breached by Ransomware Group Exploiting Its Own Vulnerabilities

In what may be one of the most ironic cybersecurity incidents of 2026, SmarterTools - the company behind the popular email server platform SmarterMail - was breached by a ransomware group that exploited critical vulnerabilities in their own software.

The attack, attributed to a China-linked group tracked as Storm-2603 (also known as Warlock), has sent shockwaves through the email hosting industry and serves as a stark reminder that no organisation is immune to the threats their own products are designed to prevent.

What Happened

On January 29, 2026, attackers exploited an unpatched SmarterMail virtual machine on SmarterTools' own internal network. The VM had been set up by an employee and was not receiving regular updates - a classic case of shadow IT creating a blind spot in an otherwise secured environment.

After gaining initial access, the attackers waited six to seven days before deploying their tools. They used Velociraptor, a legitimate digital forensics tool repurposed for persistence, followed by ransomware encryption payloads. Approximately 12 Windows servers across SmarterTools' office network and a secondary data centre used for QC testing were compromised.

The Vulnerabilities

The attack leveraged at least three critical CVEs, each representing a severe flaw in SmarterMail's architecture:

  • CVE-2025-52691 (CVSS 10.0) - A critical vulnerability that provided initial access
  • CVE-2026-23760 (CVSS 9.3) - An authentication bypass allowing attackers to reset the system administrator password via a crafted HTTP request
  • CVE-2026-24423 (CVSS 9.3) - An unauthenticated remote code execution flaw in the ConnectToHub API endpoint, requiring no authentication and allowing arbitrary command execution

On February 5, 2026, CISA added CVE-2026-24423 to its Known Exploited Vulnerabilities catalogue, marking it as actively exploited in ransomware campaigns. This was the third SmarterMail vulnerability added to the KEV catalogue in just two weeks. Federal agencies were ordered to patch by February 26, 2026.

The Scale of the Threat

Security researchers have observed more than 1,000 exploitation attempts from 60 unique attacker IP addresses targeting SmarterMail installations worldwide. SmarterMail is widely used by small and mid-sized businesses as an alternative to Microsoft Exchange, which means thousands of organisations could be at risk.

"Storm-2603 chains this access with the software's built-in Volume Mount feature to gain full system control." - Alexa Feminella, ReliaQuest Security Researcher

SmarterTools' Response

In a drastic but commendable response, SmarterTools has eliminated Windows entirely from their network infrastructure and discontinued Active Directory services. The company has released patches in SmarterMail Build 9511 and later (current version: Build 9526).

Derek Curtis, Chief Commercial Officer at SmarterTools, acknowledged the oversight: "Unfortunately, we were unaware of one VM that was not being updated."

Key Takeaways for Email Hosting Providers

This incident highlights several critical lessons:

  1. Shadow IT is a real threat - A single forgotten, unpatched VM was the entry point for a sophisticated ransomware attack
  2. Patch management is non-negotiable - The window between vulnerability disclosure and active exploitation is measured in days, not weeks
  3. Self-hosted email carries risk - Organisations running their own email servers must commit to continuous security monitoring and rapid patching
  4. Managed email hosting reduces exposure - By using a managed service, businesses transfer the burden of server security and patching to specialists who monitor threats around the clock

If you're running SmarterMail, update to Build 9511 or later immediately. If you're evaluating your email hosting strategy, this incident underscores the value of choosing a provider that prioritises security infrastructure, automated patching, and 24/7 monitoring.

Trusted Partners
MeshVOX
MeshVOX

Private cloud services platform for media streaming and real-time infrastructure monitoring.

WebM
WebM

Web design and development agency crafting high-performance websites that drive results.

Ezzy
Ezzy

Interactive learning platform helping children master maths, English, science, and more.

Retail EMS
Retail EMS

Specialist electrical, mechanical, refrigeration, and facilities management services.