Back to Intelligence

APT73 Ransomware: 48 New Victims Posted — Critical Infrastructure & Finance Sector Targeting

SA
Security Arsenal Team
April 30, 2026
6 min read

Threat Actor Profile — APT73

APT73 is a technically sophisticated Ransomware-as-a-Service (RaaS) operation that has recently escalated its activity. Unlike typical opportunistic actors, APT73 exhibits Advanced Persistent Threat (APT) tendencies by specifically weaponizing recently disclosed vulnerabilities in enterprise perimeter devices.

  • Aliases: None confirmed (operating exclusively as APT73 currently).
  • Operational Model: RaaS with closed-group initial access brokers (IABs) providing entry via zero-day/N-day exploits.
  • Ransom Demands: Historically ranges from $500k for mid-market entities to upwards of $5M for critical infrastructure targets.
  • Initial Access Vectors: Heavily reliant on exploitation of external-facing services (Microsoft Exchange, Cisco Firewalls, SmarterMail) rather than traditional phishing. They also leverage valid credentials harvested via infostealers.
  • Double Extortion: Strict adherence to double extortion. Data is exfiltrated to cloud storage prior to encryption execution.
  • Dwell Time: Short dwell time (approx. 3-5 days) between initial access and encryption, suggesting automated tooling for post-exploitation.

Current Campaign Analysis

Targeted Sectors

APT73 has broadened its scope significantly in the last week. The campaign shows a distinct pivot towards Agriculture and Food Production and Financial Services, though Business Services remains the most frequent target due to often weaker cybersecurity postures.

  • High-Risk Sectors: Financial Services (Credio, Assurified), Agriculture (Trifecta, Big Al's), Healthcare (Pindrop Hearing).

Geographic Concentration

While global, there is a massive concentration of victims in the United Kingdom (4 of the 15 listed victims) and the United States. European targets (Austria, Germany, France, Romania) are also being actively hit.

Victim Profile

The victims range from mid-market businesses (e.g., Big Al's Food Service) to large enterprises (Trifecta). Revenue estimates for the recent cluster range from $10M to $500M.

Exploitation & CVE Connection

This campaign is directly fueled by the exploitation of specific CVEs added to the CISA KEV list:

  1. CVE-2023-21529 (Microsoft Exchange): Used to gain initial access in Financial and Tech sectors.
  2. CVE-2026-20131 (Cisco Secure Firewall): Allows the gang to bypass network perimeter defenses and pivot internally, particularly in Logistics and Manufacturing environments.
  3. CVE-2026-23760 & CVE-2025-52691 (SmarterTools SmarterMail): Auth bypass and file upload flaws used to drop webshells for persistence in Business Services sectors.
  4. CVE-2025-55182 (Meta React): Exploited in Technology sectors to achieve RCE on web applications.

The posting frequency (15 victims on a single day: 2026-04-27) suggests an automated "dump" following a mass-exploitation phase.

Detection Engineering

SIGMA Rules

YAML
---
title: Potential Exchange Server Deserialization Exploit (CVE-2023-21529)
id: 4e8f9c1a-7b3d-4c2e-9f1a-5b6c7d8e9f0a
description: Detects potential deserialization attacks on Microsoft Exchange Server often associated with CVE-2023-21529 exploitation by APT73.
status: experimental
date: 2026/04/30
author: Security Arsenal Research
references:
    - https://www.cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
    product: windows
    service: security
detection:
    selection:
        EventID: 5140 or 5145
        ShareName|contains: '\\\\*\\Microsoft Exchange Server\\'
        RelativeTargetName|contains: '.dat'
    filter:
        SubjectUserName|contains: 'HealthMailbox'
    condition: selection and not filter
falsepositives:
    - Legitimate Exchange administrative access
level: critical
tags:
    - attack.initial_access
    - attack.t1190
    - cve.2023.21529
    - apt73
---
title: APT73 SmarterMail Webshell Upload Activity
date: 2026/04/30
id: b5f0d2e9-8c4a-4f3b-9a1c-6d7e8f9a0b1c
description: Detects the creation of suspicious files in SmarterMail web directories indicative of webshell upload via CVE-2025-52691.
status: experimental
author: Security Arsenal Research
logsource:
    product: windows
    service: file
detection:
    selection:
        TargetFilename|contains:
            - 'C:\\Program Files (x86)\\SmarterTools\\SmarterMail\\MRS\\'
            - 'C:\\Program Files\\SmarterTools\\SmarterMail\\MRS\\'
        TargetFilename|endswith:
            - '.aspx'
            - '.ashx'
            - '.config'
    condition: selection
falsepositives:
    - Administrative updates
level: high
tags:
    - attack.initial_access
    - attack.t1505.003
    - apt73
---
title: APT73 Lateral Movement via PsExec and WMI
date: 2026/04/30
id: a1b2c3d4-e5f6-4a5b-8c9d-0e1f2a3b4c5d
description: Detects lateral movement techniques frequently observed in APT73 campaigns prior to encryption.
status: experimental
author: Security Arsenal Research
logsource:
    product: windows
    service: security
detection:
    selection_psexec:
        EventID: 5145
        ShareName: 'ADMIN$'
        RelativeTargetName|contains: 'PSEXESVC.exe'
    selection_wmi:
        EventID: 4624
        LogonType: 3
        ProcessName|contains: 'wmiprvse.exe'
    condition: 1 of selection_*
falsepositives:
    - legitimate administrative activity
level: high
tags:
    - attack.lateral_movement
    - attack.t1021.002
    - apt73

KQL (Microsoft Sentinel)

Hunts for signs of data staging and remote execution often seen before APT73 detonation.

KQL — Microsoft Sentinel / Defender
let TimeFrame = 1h;
// Hunt for unusual child processes spawned by common system administration tools
SecurityEvent
| where TimeGenerated > ago(TimeFrame)
| where EventID in (4688, 5145)
| extend ProcessName = tostring(NewProcessName), ParentProcessName = tostring(ProcessName)
// Look for powershell/cmd spawned by unusual parents or with suspicious arguments
| where ProcessName has_any ("powershell.exe", "cmd.exe", "powershell_ise.exe")
| where ParentProcessName !in ("explorer.exe", "services.exe", "svchost.exe", "wininit.exe", "userinit.exe")
| where ProcessCommandLine has_any ("-enc", "-encodedcommand", "downloadstring", "iex", "invoke-expression")
| summarize count() by Computer, Account, ProcessName, ParentProcessName, ProcessCommandLine
| order by count_ desc

PowerShell

Rapid response script to hunt for scheduled tasks created in the last 7 days, a common persistence mechanism for APT73.

PowerShell
# Check for Scheduled Tasks created/modified in last 7 days (Persistence)
$Date = (Get-Date).AddDays(-7)
Get-ScheduledTask | Where-Object {$_.Date -gt $Date} | 
    Select-Object TaskName, TaskPath, State, Date, Author | 
    Format-Table -AutoSize

# Check for recent Shadow Copies (often deleted or manipulated by ransomware)
Get-WmiObject Win32_ShadowCopy | Where-Object { $_.InstallDate -gt $Date } | 
    Select-Object VolumeName, ClientAccessible, InstallDate

Incident Response Priorities

T-minus Detection Checklist

  • Exchange Server Logs: Immediate review of IIS/HttpProxy logs for POST requests to /ecp/, /owa/, or /autodiscover/ containing serialized data patterns (CVE-2023-21529).
  • Firewall Logs: Audit Cisco FMC logs for unauthorized access or anomalous configuration changes (CVE-2026-20131).
  • Mail Server Logs: Check SmarterMail logs for authentication bypasses or file uploads to web roots.

Critical Assets for Exfiltration

APT73 historically targets:

  1. Financial databases (SQL backups, transaction logs).
  2. Employee PII/HR records (Payroll data).
  3. Intellectual Property (Source code, manufacturing designs).

Containment Actions (Urgency: High)

  1. Isolate: Disconnect Exchange servers and Cisco FMC appliances from the network immediately if anomalies are detected.
  2. Reset: Force reset of credentials for all privileged accounts (Domain Admins, Service Accounts).
  3. Block: Block inbound traffic from known malicious IP ranges associated with APT73 C2 infrastructure at the perimeter firewall.

Hardening Recommendations

Immediate (24h)

  • Patch CVEs: Apply patches for CVE-2023-21529 (Exchange), CVE-2026-20131 (Cisco), and CVE-2025-52691 (SmarterMail) immediately.
  • Disable External Access: Temporarily disable external OWA/ECP access and restrict firewall management interfaces to internal subnets only.

Short-term (2 weeks)

  • Network Segmentation: Enforce strict segmentation preventing direct internet access for critical mail and database servers.
  • MFA Enforcement: Implement phishing-resistant MFA (FIDO2) for all administrative access to Exchange and Firewall management consoles.

Related Resources

Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub

darkwebransomware-gangapt73ransomwareexchange-exploitcve-2026-20131lateral-movement

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.