Underground Telegram Channels Weaponize SmarterMail Exploits Within Days of Disclosure, Enabling Ransomware Campaigns

Underground Telegram Channels Weaponize SmarterMail Exploits Within Days of Disclosure, Enabling Ransomware Campaigns

Researchers at Flare have documented the rapid weaponization of critical SmarterMail vulnerabilities across underground Telegram channels, showing how threat actors moved from disclosure to exploit sharing to ransomware deployment in a matter of days.

The activity centers on two critical vulnerabilities — CVE-2026-24423 (CVSS 9.3), an unauthenticated remote code execution flaw, and CVE-2026-23760 (CVSS 9.3), an authentication bypass and password reset logic flaw — both affecting SmarterMail versions prior to Build 9511. Combined, they enable full server takeover from application-level access to operating system control.

CISA added CVE-2026-24423 to its Known Exploited Vulnerabilities catalog in early February 2026 after confirming active ransomware exploitation.

Days From Disclosure to Weaponization

Flare's monitoring of underground Telegram channels revealed a predictable but alarmingly fast timeline:

  • Day of disclosure — CVE references and discussion appeared immediately across multiple channels
  • Days after disclosure — Proof-of-concept exploit code surfaced on Arabic and Spanish-speaking Telegram groups
  • Within the first week — Offensive security tools targeting the vulnerabilities were shared, along with dumps of stolen admin credentials from compromised SmarterMail servers

Researchers observed threat actors actively sharing long lists of harvested administrator credentials alongside the domains they belonged to — providing turnkey access for follow-on intrusions.

SmarterTools Breached By Their Own Flaw

In a notable twist, SmarterTools itself was breached in January 2026 when attackers exploited an unpatched SmarterMail server running on an internal VM. The compromised environment included office networks, lab infrastructure, and a data center segment connected through Active Directory.

Attackers moved laterally and impacted approximately a dozen Windows servers. The company reported that network segmentation prevented successful ransomware deployment, though the attackers achieved a significant internal foothold before containment.

Ransomware Pipeline in Action

Separate investigations have confirmed ransomware operators using SmarterMail vulnerabilities as initial access, following a consistent pattern:

  1. Initial access via email server exploitation
  2. Credential harvesting and token extraction
  3. Lateral movement through Active Directory
  4. Persistence via scheduled tasks or DFIR tool abuse
  5. Ransomware deployment after a staging period

Some campaigns have been linked to the Warlock ransomware group, with overlaps observed with nation-state-aligned activity clusters. The dwell time between initial access and encryption — a hallmark of affiliate-operated ransomware — gives defenders a narrow but actionable window for detection.

1,185 Vulnerable Servers Still Exposed

Flare's analysis of Shodan data identified approximately 17,754 unique SmarterMail servers, of which 1,185 remain vulnerable to authentication bypass or RCE exploitation. The majority are concentrated in the United States, with a distribution pattern suggesting many are self-hosted by individuals and small businesses on shared hosting, VPS providers, and general-purpose cloud infrastructure — environments with minimal security monitoring.

Why Email Servers Are High-Value Targets

SmarterMail's appeal to attackers extends beyond the vulnerability severity. Email servers occupy a privileged position in enterprise environments, providing access to domain authentication tokens, password reset capabilities, internal contact graphs, and integration with directory services. Compromising email infrastructure effectively compromises identity — and from there, lateral movement into Active Directory and broader network access becomes straightforward.

Unlike endpoints protected by EDR, email servers are often monitored less aggressively, giving attackers a quieter entry point with higher trust privileges.

Defender Recommendations

  • Patch immediately — upgrade SmarterMail to Build 9511 or later; treat email server vulnerabilities with the same urgency as domain controller flaws
  • Monitor for admin credential abuse — watch for unexpected password resets, API calls to external hosts, and outbound HTTP from mail servers
  • Network segmentation — ensure email infrastructure does not have unrestricted access to internal networks
  • Hunt for post-exploitation artifacts — look for scheduled task persistence, unexpected DFIR tooling, and remote admin tools on mail servers
  • Check exposure — verify SmarterMail instances are not publicly accessible via Shodan or similar scanning

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire