Threat Actor Profile — FULCRUMSEC
Aliases & Model: FULCRUMSEC operates as a aggressive Ransomware-as-a-Service (RaaS) entity. While relatively new to the ecosystem compared to legacy cartels, their output volume suggests a mature affiliate network.
Tactics & Operations:
- Ransom Demands: Highly variable, typically ranging from $500k for mid-market entities to multi-million dollar demands for large enterprise targets like Avnet or LexisNexis.
- Initial Access: This campaign demonstrates a heavy reliance on internet-facing infrastructure exploitation. The group is actively exploiting known CVEs in Microsoft Exchange, Cisco Secure Firewall, and SmarterTools SmarterMail rather than relying solely on phishing or brute-force RDP.
- Double Extortion: FULCRUMSEC strictly follows the double-extortion playbook, exfiltrating sensitive data (PII, IP, financial records) prior to encryption to leverage negotiation pressure.
- Dwell Time: Analysis of recent postings suggests an average dwell time of 3–5 days between initial access and encryption, indicating a "smash-and-grab" or automated encryption approach once data staging is complete.
Current Campaign Analysis
Sector Targeting: The recent victim list indicates a pivot towards high-value data repositories.
- Healthcare: Lena Health, Woundtech (Targeting patient data).
- Technology: Avnet, ReFocus AI, Hatica, Nordstern Technologies (Targeting IP and proprietary code).
- Business/Professional Services: LexisNexis, Saleskido, Interzero, Rotary Club (Targeting corporate PII and legal records).
- Financial Services: MCO.
Geographic Concentration: The campaign is overwhelmingly US-centric, with 11 of the 15 listed victims (approx. 73%) based in the United States. Secondary targets include Mexico, India, Germany, and Colombia, suggesting a scanning strategy that prioritizes English-speaking regions and North American time zones.
Victim Profile:
- Size: Mix of mid-market (Saleskido, ParkEngage) and large enterprise (Avnet, LexisNexis).
- Revenue: Estimated revenues range from $10M to over $20B annually.
CVE Correlation & Initial Access Vectors: The inclusion of specific CVEs in the CISA KEV list associated with this group provides clear insight into their ingress vectors:
- CVE-2023-21529 (Microsoft Exchange): Deserialization vulnerability. This allows authenticated attackers to execute code, likely used after credential harvesting or via minor privilege escalation.
- CVE-2026-23760 / CVE-2025-52691 (SmarterTools SmarterMail): Auth bypass and unrestricted file upload. This is a critical vector for web shell deployment, likely used against the Technology and Business Services victims running mail servers.
- CVE-2026-20131 (Cisco Secure Firewall FMC): Deserialization vulnerability. This grants the threat actor the ability to bypass firewall controls or modify security policies, facilitating lateral movement and C2 traffic obfuscation.
Detection Engineering
SIGMA Rules
title: Suspicious Microsoft Exchange Deserialization Pattern (CVE-2023-21529)
id: 3f8b3f8b-3f8b-3f8b-3f8b-3f8b3f8b3f8b
description: Detects potential exploitation of Microsoft Exchange Server deserialization vulnerabilities via suspicious w3wp.exe process chains.
status: experimental
date: 2026/05/05
author: Security Arsenal
references:
- https://cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
product: windows
service: security
detection:
selection:
EventID: 4688
NewProcessName|endswith: '\w3wp.exe'
ParentProcessName|endswith: '\Microsoft.Exchange.Directory.AppPool\w3wp.exe'
filter_legit:
CommandLine|contains:
- 'Microsoft.Exchange.Management'
- 'MSExchangeHMWorker'
condition: selection and not filter_legit
falsepositives:
- Legitimate Exchange management tasks
level: high
---
title: SmarterMail Webshell Upload Activity (CVE-2025-52691)
id: a1b2c3d4-a1b2-a1b2-a1b2-a1b2c3d4e5f6
description: Detects the creation of suspicious file extensions in the SmarterMail web root, indicative of an unrestricted file upload vulnerability exploit.
status: experimental
date: 2026/05/05
author: Security Arsenal
references:
- https://cisa.gov/known-exploited-vulnerabilities-catalog
logsource:
product: windows
file_creation:
TargetFilename|contains: '\Mails\'
TargetFilename|endswith:
- '.aspx'
- '.ashx'
- '.asmx'
condition: selection
falsepositives:
- Legitimate admin updates to SmarterMail
level: critical
---
title: PsExec Lateral Movement Indicator
id: e5f6g7h8-e5f6-e5f6-e5f6-e5f6g7h8i9j0
description: Detects the use of PsExec or similar tools for lateral movement, a common TTP for ransomware gangs prior to encryption.
status: experimental
date: 2026/05/05
author: Security Arsenal
logsource:
product: windows
service: security
detection:
selection:
EventID: 4688
NewProcessName|endswith:
- '\psexec.exe'
- '\psexec64.exe'
- '\PAExec.exe'
CommandLine|contains: '\\'
condition: selection
falsepositives:
- Legitimate administrative tasks
level: high
KQL (Microsoft Sentinel)
// Hunt for potential data staging (large file copy operations) and lateral movement
// associated with FULCRUMSEC playbook
DeviceProcessEvents
| where Timestamp >= ago(7d)
| where FileName in~ ("powershell.exe", "cmd.exe", "robocopy.exe", "rclone.exe", "winscp.exe")
| where ProcessCommandLine has_any ("copy", "move", "sync", "compress")
or ProcessCommandLine has "/archive"
| summarize count(), arg_max(Timestamp, *) by DeviceName, AccountName, FileName
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName
| order by Timestamp desc
PowerShell - Rapid Response Script
<#
.SYNOPSIS
FULCRUMSEC Response Script - Checks for suspicious scheduled tasks and recent mass file modifications.
.DESCRIPTION
This script scans for tasks created in the last 7 days and identifies directories
with rapid file encryption potential (mass modifications).
#>
Write-Host "[+] Checking for Scheduled Tasks created in the last 7 days..." -ForegroundColor Cyan
Get-ScheduledTask | Where-Object { $_.Date -gt (Get-Date).AddDays(-7) } | Select-Object TaskName, TaskPath, Date, Author
Write-Host "[+] Scanning for recently modified Volume Shadow Copies (potential tampering)..." -ForegroundColor Cyan
$vss = vssadmin list shadows | Select-String "Shadow Copy Volume"
Write-Output $vss
Write-Host "[+] Checking for common web shells in web roots (IIS)..." -ForegroundColor Cyan
$paths = @("C:\inetpub\wwwroot", "C:\Program Files\SmarterTools\SmarterMail\Mails")
foreach ($path in $paths) {
if (Test-Path $path) {
Write-Host "Scanning $path..."
Get-ChildItem -Path $path -Recurse -Include *.aspx, *.ashx, *.asmx, *.php | Where-Object { $_.LastWriteTime -gt (Get-Date).AddHours(-48) } | Select-Object FullName, LastWriteTime
}
}
Incident Response Priorities
T-Minus Detection Checklist:
- Web Shell Hunt: Immediately scan IIS logs and SmarterMail directories for
POSTrequests containing anomalous payloads or recent creation of.aspx/.ashxfiles. - Exchange Auditing: Review Windows Security logs on Exchange servers for logons from unusual IPs or the execution of
powershell.exespawned byw3wp.exe. - Firewall Configs: Audit Cisco FMC configurations for unauthorized rule changes or new user accounts (CVE-2026-20131).
Critical Assets at Risk:
- Active Directory: FULCRUMSEC targets AD for credential dumping (DCSync).
- Email Archives: Exfiltration of mailboxes is a priority for Business Services victims.
- EMR/Patient Databases: High-value targets for Healthcare victims.
Containment Actions:
- Isolate: Disconnect infected Exchange/SmarterMail servers from the network immediately.
- Revoke: Reset credentials for all admin accounts that have accessed the compromised mail or firewall infrastructure in the last 30 days.
- Block: Block inbound and outbound traffic to known C2 infrastructure associated with FULCRUMSEC (check threat intel feeds for specific IPs).
Hardening Recommendations
Immediate (24 Hours):
- Patch Critical CVEs: Apply patches for CVE-2023-21529 (Exchange), CVE-2026-23760, CVE-2025-52691 (SmarterMail), and CVE-2026-20131 (Cisco FMC) immediately.
- Disable External RDP: Ensure RDP is not exposed to the internet and enforce MFA for all remote access.
- URL Rewrite Rules: Implement IIS URL Rewrite rules to block common web shell upload patterns.
Short-term (2 Weeks):
- Network Segmentation: Segregate backup servers from the main network to prevent backup encryption.
- Zero Trust Architecture: Implement strict validation for all lateral movement attempts (e.g., require Privileged Access Workstations (PAWs) for server administration).
- EDR Deployment: Ensure EDR agents are running on all mail gateway and perimeter devices.
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.