Back to Intelligence

APT73 Ransomware: Global Surge Targets Finance & Education via Critical Infrastructure CVEs

SA
Security Arsenal Team
April 27, 2026
7 min read

Date: 2026-04-27 Source: Security Arsenal Dark Web Intelligence Unit


Threat Actor Profile — APT73

APT73 operates as a highly aggressive Ransomware-as-a-Service (RaaS) entity with a sophisticated closed-loop affiliate model. Unlike traditional gangs that focus purely on encryption, APT73 affiliates prioritize "Living off the Land" (LotL) techniques to blend into enterprise environments before detonation.

  • Known Aliases: None confirmed (APT73 appears to be a rebranding or splinter cell from a defunct LockBit/BlackCat affiliate group).
  • Ransom Model: Double extortion. They aggressively exfiltrate sensitive PII and financial data before encryption, often threatening third-party partners (supply chain leakage).
  • Initial Access: Primarily internet-facing application exploitation ( Exchange, Email Gateways, Firewall Management Consoles). They are less reliant on phishing than other groups, preferring technical vulnerabilities in perimeter infrastructure.
  • Dwell Time: Short (average 3–5 days). They move from exploitation to exfiltration rapidly, usually striking over weekends to minimize SOC response time.

Current Campaign Analysis

Based on the 15 victims posted on 2026-04-27, APT73 is executing a broad, geographically dispersed campaign with a specific focus on high-value institutions in emerging markets and the education sector.

Targeted Sectors

  • Financial Services: High activity in South Asia and Eastern Europe (e.g., bankasia-bd.com in Bangladesh, banak.com in Turkey).
  • Public Sector: Government agencies in Moldova (compensatii.gov.md) and UAE (moccae.gov.ae).
  • Education: Universities in Thailand (mahidol.ac.th) and Serbia (bg.ac.rs).

Geographic Concentration

While global, there is a distinct cluster in South Asia (Bangladesh) and the Middle East (UAE). This suggests affiliates are specifically scanning IP blocks in these regions for unpatched infrastructure.

Exploited CVEs as Initial Access Vectors

The victimology strongly correlates with the CISA KEV list associated with this group.

  • CVE-2023-21529 (Microsoft Exchange): Likely the vector for hl.co.uk (GB) and vanheyghenstaal.be (BE). This deserialization flaw allows authenticated code execution—a prize target for financial sector data theft.
  • CVE-2025-52691 / CVE-2026-23760 (SmarterTools SmarterMail): Highly relevant to the Education sector victims (mahidol.ac.th, bg.ac.rs). SmarterMail is popular in universities for its cost-effectiveness; the file upload and auth bypass flaws provide easy remote code execution (RCE).
  • CVE-2026-20131 (Cisco Secure Firewall Management Center): The targeting of large entities like moccae.gov.ae suggests potential perimeter bypassing. Exploiting the FMC allows attackers to modify firewall rules to allow C2 traffic or disable logging before the ransomware detonates.

Victim Profile

Targets range from mid-sized logistics (novoair-bd.com) to national infrastructure. The common denominator is the reliance on externally facing mail and management interfaces without robust MFA or patching.


Detection Engineering

The following detection logic is designed to catch the specific initial access vectors (Exchange/SmarterMail) and the subsequent lateral movement typical of APT73 operations.

SIGMA Rules

YAML
---
title: Potential Exchange Deserialization Exploit (CVE-2023-21529)
id: d7b5b4c2-1a3e-4d5f-9e6b-8c7d6e5f4a3b
description: Detects suspicious deserialization activities in Microsoft Exchange logs often associated with CVE-2023-21529 exploitation attempts.
status: experimental
date: 2026/04/27
author: Security Arsenal Research
references:
    - https://cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
    product: windows
    service: msexchange-management
detection:
    selection:
        EventID: 6 # Or relevant Exchange backend log ID for serialization errors
        Message|contains:
            - 'BinaryFormatter'
            - 'LosFormatter'
            - 'ObjectStateFormatter'
    filter_legit:
        SubjectUserName|contains: 'HealthMailbox'
    condition: selection and not filter_legit
falsepositives:
    - Legitimate Exchange management scripts
level: high
---
title: SmarterMail Auth Bypass and File Upload (CVE-2025-52691 / CVE-2026-23760)
id: e8c6d3e1-2b4f-5e6a-0f7c-9d8e7f6a5b4c
description: Detects web requests to SmarterMail endpoints indicative of authentication bypass or unrestricted file upload exploitation.
status: experimental
date: 2026/04/27
author: Security Arsenal Research
logsource:
    product: webserver
detection:
    selection_uri:
        cs-uri-query|contains:
            - '/WebService/Mail.asmx'
            - '/MailLogin.aspx'
    selection_suspicious:
        cs-method: 'POST'
        sc-status: 200
    condition: selection_uri and selection_suspicious
falsepositives:
    - Legitimate mail client access
level: high
---
title: APT73 Lateral Movement via PsExec and WMI
id: f9d7e4f2-3c5g-6h7b-1g8d-0e9f0a1b2c3d
description: Detects the use of PsExec or WMI for lateral movement, a hallmark of APT73 post-exploitation behavior before encryption.
status: experimental
date: 2026/04/27
author: Security Arsenal Research
logsource:
    product: windows
    service: security
detection:
    selection_psexec:
        EventID: 4688
        NewProcessName|endswith:
            - '\psexec.exe'
            - '\psexec64.exe'
    selection_wmi:
        EventID: 4688
        NewProcessName|endswith: '\wmiprvse.exe'
        ParentProcessName|endswith: '\svchost.exe'
    condition: 1 of selection_
falsepositives:
    - Administrative IT management
level: medium

KQL (Microsoft Sentinel)

KQL — Microsoft Sentinel / Defender
// Hunt for SmarterMail Exploitation and subsequent PowerShell Activity
// Correlates IIS logs with process execution
let SmarterMailEndpoints = dynamic(["/MailLogin.aspx", "/WebService/Mail.asmx", "/grizzlyhandler.ashx"]);
let TimeFrame = 1h;
let IISLogs = imWebEvent
| where TimeGenerated > ago(TimeFrame)
| where csUriStem in (SmarterMailEndpoints) and csMethod == "POST" and scStatus == 200
| project ComputerIP = cIP, TimeGenerated, Url = csUriStem;
let ProcessActivity = DeviceProcessEvents 
| where TimeGenerated > ago(TimeFrame)
| where InitiatingProcessFileName in ("w3wp.exe", "webengine.dll") // Web shell spawning process
| where ProcessCommandLine has "powershell" or ProcessCommandLine has "cmd"
| project DeviceName, TimeGenerated, ProcessCommandLine;
IISLogs
| join kind=inner (ProcessActivity) on $left.ComputerIP == $right.DeviceName
| project TimeGenerated, ComputerIP, Url, ProcessCommandLine

PowerShell Rapid Response Script

PowerShell
<#
.SYNOPSIS
    APT73 Incident Response Check - Exchange & SmarterMail
.DESCRIPTION
    Checks for indicators of CVE-2023-21529 (Exchange) and suspicious SmarterMail processes.
    Also enumerates scheduled tasks created in the last 7 days (common persistence).
#>

Write-Host "[*] APT73 Rapid Response Check" -ForegroundColor Cyan

# 1. Check Exchange Backend Logs for Deserialization Errors (Last 24h)
Write-Host "\n[+] Checking Exchange Application Logs for Deserialization Events..." -ForegroundColor Yellow
try {
    $events = Get-WinEvent -LogName "MSExchange Management" -ErrorAction SilentlyContinue | 
              Where-Object { $_.TimeCreated -gt (Get-Date).AddHours(-24) -and 
                            $_.Message -match "(BinaryFormatter|LosFormatter|Deserialization)" }
    if ($events) { 
        $events | Select-Object TimeCreated, Id, Message | Format-Table
        Write-Host "[!] SUSPICIOUS ACTIVITY DETECTED in Exchange Logs." -ForegroundColor Red
    } else {
        Write-Host "[-] No suspicious deserialization events found." -ForegroundColor Green
    }
} catch {
    Write-Host "[-] Could not access MSExchange Management logs." -ForegroundColor Gray
}

# 2. Check for SmarterMail Web Shell Suspicious Processes
Write-Host "\n[+] Checking for SmarterMail Service Suspicious Children..." -ForegroundColor Yellow
$smarterMailProc = Get-Process -Name "SmarterMail" -ErrorAction SilentlyContinue
if ($smarterMailProc) {
    $children = Get-WmiObject Win32_Process | Where-Object { $_.ParentProcessId -eq $smarterMailProc.Id }
    if ($children) {
        Write-Host "[!] SmarterMail spawning unexpected child processes:" -ForegroundColor Red
        $children | Select-Object Name, CommandLine
    }
}

# 3. Check for Scheduled Tasks created in last 7 days (Persistence)
Write-Host "\n[+] Enumerating Scheduled Tasks created/modified in last 7 days..." -ForegroundColor Yellow
$cutoffDate = (Get-Date).AddDays(-7)
Get-ScheduledTask | Where-Object { 
    $_.Date -gt $cutoffDate -or 
    (Get-ScheduledTaskInfo $_.TaskName).LastRunTime -gt $cutoffDate 
} | Select-Object TaskName, Date, Author, State

Write-Host "\n[*] Script Complete." -ForegroundColor Cyan


---

Incident Response Priorities

  1. T-Minus Detection Checklist (Pre-Encryption):

    • Hunt for w3wp.exe (IIS worker process) spawning cmd.exe or powershell.exe. This indicates a web shell on Exchange or SmarterMail.
    • Check firewall logs for large outbound data transfers (Exfiltration) occurring during non-business hours.
    • Look for unexpected modifications to web.config files on mail servers.
  2. Critical Assets Prioritized for Exfiltration:

    • Finance: ACH transfer logs, customer PII databases.
    • Gov/Edu: Employee tax forms (W-2 equivalent), grant application data, student/patient records.
  3. Containment Actions (Urgency Ordered):

    • IMMEDIATE: Disconnect identified mail servers (Exchange/SmarterMail) from the network if IOCs are found. Do not shut down (preserve memory) but isolate VLAN.
    • HIGH: Force-reset all service account passwords used for Exchange and Cisco FMC management.
    • MEDIUM: Suspend any automated batch jobs or scheduled tasks not previously documented.

Hardening Recommendations

  • Immediate (24h):

    • Patch: Apply the security update for CVE-2023-21529 (Exchange) immediately.
    • Restrict: Ensure Cisco FMC and SmarterMail management interfaces are NOT exposed to the public internet. Enforce VPN access + MFA for admin panels.
    • Block: Block inbound traffic to /WebService/Mail.asmx and /MailLogin.aspx from untrusted IP geolocations (especially if not required for business).
  • Short-term (2 weeks):

    • Architecture: Move email management interfaces behind a Zero Trust Access Gateway (ZTNA).
    • Segmentation: Ensure Active Directory domain controllers do not allow RPC/WinRM connections directly from DMZ email servers.
    • Monitoring: Deploy specific RBA (Rule-Based Alerts) for any account creation or modification within the Exchange Organization Management group.

Related Resources

Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub

darkwebransomware-gangapt73ransomwareexchange-servercisco-fmcinitial-accesslateral-movement

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.