feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouUnited StatesUnited States
You
bookmarksYour BookmarkshashtagYour Topics
Trending
Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / SmarterTools Recovers from Ransomware, Shifts to Linux

SmarterTools Recovers from Ransomware, Shifts to Linux

11 Feb

•

Summary

  • Unpatched server vulnerability led to ransomware attack.
  • SmarterTools ditched Windows servers and Active Directory.
  • No business applications or account data were compromised.
SmarterTools Recovers from Ransomware, Shifts to Linux

SmarterTools, a software company, has confirmed it was the target of a ransomware attack. The incident was attributed to an unpatched vulnerability in a SmarterMail server, specifically CVE-2026-23760, which allowed for authentication bypass and full administrator privileges. This vulnerability was present in versions prior to Build 9518.

The company's Chief Commercial Officer, Derek Curtis, stated that one overlooked virtual machine, not being updated, was the entry point. This led to a breach affecting the office network and a data center. The Warlock ransomware gang is suspected to be behind the attack.

In response, SmarterTools has taken decisive action to prevent recurrence. They have migrated away from Windows servers and have discontinued the use of Active Directory services, which were exploited for lateral movement within the network. The company emphasized that its website, shopping cart, and other critical services remained operational throughout the incident.

trending

Salesforce lays off 1000

trending

India US trade tariffs slashed

trending

Margot Robbie's Wuthering Heights panned

trending

CBSE board exams: key details

trending

Jana Nayagan movie court case

trending

Dhakshineswar Suresh Davis Cup hero

trending

Deepika Padukone wears Gaurav Gupta

trending

NZ vs UAE match prediction

trending

iPhone 17 Croma Valentine's sale

SmarterTools assured customers that none of its business applications or account data were compromised. The majority of their infrastructure is now Linux-based, with only a limited number of Windows servers remaining, most of which had their malicious activities blocked by antivirus software. Users of SmarterTools are advised to upgrade to Build 9518 or later to patch the vulnerability.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
The ransomware attack on SmarterTools was caused by an unpatched vulnerability, CVE-2026-23760, in SmarterMail versions prior to Build 9518, which allowed for authentication bypass.
SmarterTools ditched Windows servers and stopped using Active Directory services to prevent future attacks and improve network security.
No, SmarterTools confirmed that none of its business applications or customer account data were affected or compromised during the ransomware incident.

Read more news on

Technologyside-arrow

You may also like

Under Armour Data Breach: Millions Exposed

31 Jan • 41 reads

article image

WinRAR Hackers Exploit Critical Flaw

29 Jan • 9 reads

article image

Trend Micro Patches Critical Apex Central Vulnerability

12 Jan • 164 reads

article image

Covenant Health Data Breach Swells to 500K Patients

11 Jan • 72 reads

article image

University of Phoenix Hack Exposes 3.5M Data Records

4 Jan • 46 reads

article image