Threat Actor Profile — FULCRUMSEC
Known Aliases: FULCRUM, Helix-Team (suspected)
Operational Model: FULCRUMSEC operates as a Ransomware-as-a-Service (RaaS) platform with an affiliate network that has expanded significantly in Q2 2026. Unlike many modern groups, they maintain a leak site with strict vetting procedures for affiliates and centralized negotiation channels.
Typical Ransom Demands: $300,000 - $5M USD based on victim revenue, with multi-tiered decryption pricing (single system vs. enterprise-wide)
Initial Access Methods:
- Email server vulnerabilities (SmarterMail, Microsoft Exchange)
- VPN/concentrator exploitation (Cisco Secure Firewall)
- Supply chain compromise via SaaS platforms
- Spear-phishing with weaponized documents (recent shift)
Double Extortion Approach: FULCRUMSEC aggressively exfiltrates sensitive data before encryption, threatening publication within 72-96 hours of initial contact. They maintain a professional negotiation protocol with documented "good faith" decryption proofs.
Average Dwell Time: 7-14 days from initial access to encryption, with peak exfiltration activity occurring days 3-7
Current Campaign Analysis
Sectors Under Attack:
- Technology (4 victims) - 27% of recent postings
- Healthcare (2 victims) - 13%
- Business Services (4 victims) - 27%
- Financial Services (1 victim) - 7%
- Consumer Services (2 victims) - 13%
- Manufacturing/Other (2 victims) - 13%
Geographic Concentration:
- United States: 13 victims (87%)
- Mexico: 1 victim (7%)
- India: 1 victim (7%)
- Germany, Colombia, Netherlands: 1 victim each in recent 100-posting history
Victim Profile:
- Mix of mid-market ($50M-$500M revenue) and large enterprises
- Significant targeting of B2B technology services providers
- Healthcare providers with PHI repositories prioritized
- Recent expansion into financial services vertical
Posting Frequency & Escalation:
- Current batch represents a single publication wave (2026-05-01)
- Average of 3.8 new victims posted weekly
- Escalation timeline: Leak site posting occurs approximately 3-4 days after ransom deadline expiration
- Notable increase in posting velocity (+45%) compared to Q1 2026
CVE Correlations & Initial Access Vectors: Recent campaign shows strong correlation with actively exploited vulnerabilities:
-
CVE-2026-23760 (SmarterMail Authentication Bypass): Used in 35% of recent breaches, particularly against US-based technology and business services firms. This allows direct credential bypass and administrative access.
-
CVE-2025-52691 (Meta React Server Components RCE): Likely exploited against web-facing applications of tech sector victims.
-
CVE-2023-21529 (Microsoft Exchange Deserialization): Identified in older campaigns, potentially still in rotation against unpatched Exchange servers.
-
CVE-2026-20131 (Cisco Secure Firewall Management): Used for perimeter bypass in several financial services engagements.
Detection Engineering
---
title: Potential FULCRUMSEC Initial Access via SmarterMail Authentication Bypass
description: Detects potential authentication bypass exploitation in SmarterMail servers associated with FULCRUMSEC campaigns
author: Security Arsenal Threat Research Team
date: 2026/05/05
references:
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
product: webserver
service: iis, apache, nginx
detection:
selection:
c-uri|contains:
- '/Services/MailService.asmx'
- '/Services/Service.asmx/Login'
- '/SmarterMail/Admin/'
sc-status:
- 200
- 500
condition: selection
falsepositives:
- Legitimate SmarterMail administration
level: critical
---
title: FULCRUMSEC Lateral Movement via PsExec with Renamed Binary
description: Detects PsExec usage with renamed binaries commonly used by FULCRUMSEC operators
date: 2026/05/05
author: Security Arsenal Threat Research Team
logsource:
product: windows
service: security
detection:
selection:
EventID: 5145
RelativeTargetName|contains:
- 'ADMIN$'
- 'IPC$'
ShareName: '\\*\*'
SubjectUserName|contains:
- 'admin'
- 'administrator'
filter_legit:
ProcessName|endswith:
- '\psexec.exe'
- '\psexec64.exe'
condition: selection and not filter_legit
falsepositives:
- Legitimate system administration
level: high
---
title: FULCRUMSEC Data Staging Prior to Encryption
description: Detects rapid creation of archives and mass file copying patterns typical of FULCRUMSEC exfiltration preparation
date: 2026/05/05
author: Security Arsenal Threat Research Team
logsource:
product: windows
service: security
detection:
selection_7z:
EventID: 4663
ObjectType: 'File'
ObjectName|contains: '.7z'
AccessMask: '0x2'
selection_rar:
EventID: 4663
ObjectType: 'File'
ObjectName|contains: '.rar'
AccessMask: '0x2'
timeframe: 5m
condition: (selection_7z or selection_rar) | count() > 10
falsepositives:
- Legitimate backup operations
- User-initiated archiving
level: high
**KQL Hunt Query - Lateral Movement Detection**:
kql
// FULCRUMSEC lateral movement hunt
let timeframe = 7d;
SecurityEvent
| where TimeGenerated >= ago(timeframe)
| where EventID in (5140, 5145, 4624, 4625)
| where TargetUserName == "Administrator" or TargetUserName contains "admin"
| where AccountType == "User"
| where Computer != ComputerIP
| summarize count() by Computer, TargetUserName, EventID, bin(TimeGenerated, 1h)
| where count_ > 10
| sort by count_ desc nulls last
| project-rename "Source" = Computer, "TargetAdmin" = TargetUserName, "EventCount" = count_
**Rapid Response PowerShell Script**:
powershell
# FULCRUMSEC Emergency Detection Script
# Checks for indicators of pre-encryption staging
function Test-FulcrumsecIndicators {
param(
[int]$HoursToCheck = 24
)
$CutoffDate = (Get-Date).AddHours(-$HoursToCheck)
$Results = @()
# Check for recently modified scheduled tasks
Write-Host "Checking for recently created/modified scheduled tasks..." -ForegroundColor Yellow
$SuspiciousTasks = Get-ScheduledTask | Where-Object {$_.Date -gt $CutoffDate} |
Select-Object TaskName, Date, Author, @{N='Command';E={$_.Actions.Execute}}
if ($SuspiciousTasks) {
$Results += [PSCustomObject]@{
Indicator = "Scheduled Task"
Details = $SuspiciousTasks | ConvertTo-Json -Compress
Severity = "High"
}
}
# Check for recently modified VSS snapshots
Write-Host "Checking Volume Shadow Copy modifications..." -ForegroundColor Yellow
$VSSChanges = vssadmin list shadows /for=c: 2>$null | Select-String "Shadow Copy Volume"
if ($VSSChanges) {
$Results += [PSCustomObject]@{
Indicator = "VSS Activity"
Details = $VSSChanges.Matches.Value
Severity = "Medium"
}
}
# Check for unusual RDP connections
Write-Host "Checking for RDP connection patterns..." -ForegroundColor Yellow
$RDPEvents = Get-WinEvent -FilterHashtable @{LogName='Security'; ID=4624; StartTime=$CutoffDate} -ErrorAction SilentlyContinue |
Where-Object {$_.Message -match 'Logon Type.*10' -and $_.Message -notmatch 'Source Network Address.*-'} |
Measure-Object
if ($RDPEvents.Count -gt 50) {
$Results += [PSCustomObject]@{
Indicator = "Excessive RDP"
Details = "$($RDPEvents.Count) RDP connections in past $HoursToCheck hours"
Severity = "Medium"
}
}
# Check for archive creation patterns
Write-Host "Checking for archive creation patterns..." -ForegroundColor Yellow
$ArchiveFiles = Get-ChildItem -Path C:\ -Recurse -Include *.7z, *.rar, *.zip -ErrorAction SilentlyContinue |
Where-Object {$_.LastWriteTime -gt $CutoffDate -and $_.Length -gt 100MB} |
Measure-Object
if ($ArchiveFiles.Count -gt 0) {
$Results += [PSCustomObject]@{
Indicator = "Large Archives"
Details = "$($ArchiveFiles.Count) large archives created in past $HoursToCheck hours"
Severity = "Critical"
}
}
# Output results
if ($Results.Count -eq 0) {
Write-Host "No suspicious activity detected." -ForegroundColor Green
} else {
Write-Host "`n[!] SUSPICIOUS ACTIVITY DETECTED:" -ForegroundColor Red
$Results | Format-Table -AutoSize
}
return $Results
}
# Execute the check
Test-FulcrumsecIndicators -HoursToCheck 48
---
Incident Response Priorities
T-Minus Detection Checklist:
- SmarterMail/IIS logs for authentication bypass patterns (CVE-2026-23760)
- Suspicious scheduled tasks created within last 7 days
- Unusual PowerShell execution patterns with encoded commands
- Large volume of file modifications (>500 files) within 5-minute windows
- External network connections on non-standard ports (e.g., 4444, 8443)
- Unusual service account usage or permission escalations
- VSS snapshot manipulation or deletion attempts
Critical Assets Historically Targeted:
- Email servers and user mailboxes (full export)
- Customer databases and CRM systems
- Financial records (billing, invoices, payment info)
- Intellectual property and source code repositories
- HR data containing PII/PHI
Containment Actions (Ordered by Urgency):
- IMMEDIATE: Isolate systems with SmarterMail/Microsoft Exchange from network
- IMMEDIATE: Disable all external-facing RDP/VPN access temporarily
- URGENT: Revoke and reset all service account credentials
- URGENT: Isolate backup repositories from the network
- HIGH: Block all outbound connections to known FULCRUMSEC C2 infrastructure
- HIGH: Implement network segmentation to limit lateral movement
Hardening Recommendations
Immediate Actions (Within 24 Hours):
- Patch Priority 1: Apply security updates for SmarterMail (CVE-2026-23760, CVE-2025-52691) immediately
- Patch Priority 2: Update Microsoft Exchange servers to address CVE-2023-21529
- Patch Priority 3: Update Cisco Secure Firewall Management Center (CVE-2026-20131)
- Implement MFA for all email server administrative access
- Restrict RDP/VPN access to specific IP ranges and require MFA
- Disable unused ports on firewalls and internal network segments
- Create network isolation for backup systems
Short-Term Actions (Within 2 Weeks):
- Deploy honeypots for email services to detect early reconnaissance
- Implement network segmentation with strict east-west traffic controls
- Deploy behavioral monitoring solutions for unusual data access patterns
- Review and reduce administrative account privileges (principle of least privilege)
- Implement secure backup verification procedures (offline or immutable backups)
- Conduct threat hunting exercises focused on initial access vectors
- Enhance email security with DMARC, DKIM, and SPF configurations
- Review and harden Meta React Server Components implementations
- Establish a ransomware-specific incident response playbook
- Conduct third-party penetration testing focusing on the exploited CVEs
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.