Software vendor SmarterTools has been compromised by the Warlock ransomware group (also tracked as Storm-2603) in an attack that exploited a vulnerability in the company's own product. The attackers gained initial access by exploiting CVE-2026-23760, a critical authentication bypass vulnerability in the SmarterMail email server. After breaching the network, the threat actors deployed their ransomware payload and took steps to establish persistence by installing a malicious version of the legitimate Velociraptor digital forensics tool. This incident serves as a potent and ironic lesson in the importance of rapid patching, as the company fell victim to a known and patchable flaw in its own software.
The attack, first detected on January 29, 2026, was carried out by the Warlock ransomware gang. Their attack chain was efficient and effective:
T1190): The group exploited CVE-2026-23760 on an unpatched, internet-facing SmarterMail server to gain their initial foothold within the SmarterTools network.T1036) and use of Remote Access Software (T1219).T1486): The ultimate goal was achieved by deploying the Warlock ransomware to encrypt files and disrupt operations.For SmarterTools, this is a particularly damaging incident. Not only does the company suffer the typical costs and disruption of a ransomware attack, but the fact that they were breached by a vulnerability in their own product creates a significant reputational crisis. It calls into question their internal security practices and may cause their customers to lose faith in the security of the SmarterMail product itself. Customers will be urgently questioning whether they too are at risk and if the vendor is following its own security advice.
| Type | Value | Description |
|---|---|---|
| file_name | Supabase.msi |
The malicious installer used to deploy the Velociraptor tool. |
| process_name | velociraptor.exe |
The execution of the Velociraptor binary in an unexpected context is a strong indicator of compromise. |
| url_pattern | SmarterMail web interface URL | Monitor for exploit attempts against CVE-2026-23760. |
CVE-2026-23760 and patched. Any remaining vulnerable instances should be considered at high risk of compromise.velociraptor.exe or any suspicious MSI installations, especially on mail servers. EDR tools should be configured to alert on legitimate administrative or DFIR tools being used in an unauthorized manner. This is a key part of D3FEND Process Analysis (D3-PA).CVE-2026-23760 immediately. This is the most critical step. This is a direct application of D3FEND Software Update (D3-SU).The most fundamental mitigation: promptly apply security patches for all software, especially internet-facing applications.
Use EDR to detect when legitimate tools like Velociraptor are used in a malicious context.
Use application control or whitelisting to prevent unauthorized software (like a rogue Velociraptor install) from running on critical servers.
This incident is a textbook case for the importance of timely Software Updates. SmarterTools was breached by a known, patchable vulnerability in its own product. The primary and most effective countermeasure is a robust and rapid patch management program. For a critical, internet-facing application like the SmarterMail server, 'rapid' should mean hours or days, not weeks. Organizations must have a complete asset inventory to know they are running SmarterMail, subscribe to vendor security bulletins, and have a process to quickly test and deploy critical security patches. In this case, simply applying the patch for CVE-2026-23760 when it was released would have completely prevented this breach.
To prevent the attackers from establishing persistence with a malicious tool, SmarterTools could have used Executable Allowlisting on their mail server. A mail server has a very predictable set of processes that need to run. An allowlisting policy would define this set of legitimate executables and block everything else by default. When the attacker attempted to run their malicious 'Supabase.msi' or the resulting 'velociraptor.exe', the operating system would have blocked the execution because it was not on the approved list. This would have stopped the attack after the initial access, preventing the deployment of ransomware and significantly limiting the damage.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats