
Risky Bulletin Risky Bulletin: SmarterTools hacked via its own product
8 snips
Feb 9, 2026 A software vendor is compromised through flaws in its own product. European agencies are hit using recent zero-days. A Signal pairing phishing campaign is linked to a state actor targeting Germany. Massive data extortion claims and large ransomware costs make headlines. AI skill uploads trigger new malware scanning measures.
AI Snips
Chapters
Transcript
Episode notes
Vendor Product Became The Attack Vector
- SmarterTools was breached through vulnerabilities in its own SmarterMail product, showing vendor software can be the attack vector.
- SmarterTools linked the attack to Warlock but said security controls stopped encryption and three SmarterMail bugs entered CISA-KEV this year.
Zero-Days Led To High-Profile European Breaches
- Recent Ivanti (Avanti) zero-days were used to breach multiple Dutch agencies and likely the European Commission.
- The breaches exposed staff contact details and were reported to parliament after disclosures in late January.
Signal Pairing Used In State-Level Targeting
- A state-sponsored actor targeted German politicians, military staff and journalists via Signal pairing phishing.
- The technique aims to trick users into pairing attackers' devices to their Signal accounts and mirrors tactics used by Russian groups.
