Connect with us

Tech

Telegram channels expose rapid weaponization of SmarterMail flaws

Published

on

Flare header showing a cybery tunnel

Flare researchers monitoring underground Telegram channels and cybercrime forums have observed threat actors rapidly sharing proof-of-concept exploits, offensive tools, and stolen administrator credentials related to recently disclosed SmarterMail vulnerabilities, providing insight into how quickly attackers weaponize new security flaws.

The activity occurred within days of the vulnerabilities being disclosed, with threat actors sharing and selling exploit code and compromised access tied to CVE-2026-24423 and CVE-2026-23760, critical flaws that enable remote code execution and authentication bypass on exposed email servers.

These vulnerabilities have since been confirmed in real-world attacks, including ransomware campaigns, highlighting how attackers increasingly target email infrastructure as an initial access point into corporate networks, allowing them to move laterally and establish persistent footholds.

CVE-2026-24423 and CVE-2026-23760: Critical RCE and Auth Bypass Flaws

Multiple recently disclosed SmarterMail vulnerabilities created a perfect storm that made the platform highly attractive to attackers. Among them, CVE-2026-24423 stands out as a critical unauthenticated remote code execution flaw affecting versions prior to Build 9511.

Advertisement

With a CVSS score of 9.3 and no user interaction required, the flaw is particularly suited for automation, large-scale scanning, and mass exploitation campaigns.

In parallel, additional vulnerabilities CVE-2026-23760 (CVSS 9.3) include authentication bypass and password reset logic flaws. It allows attackers to reset administrator credentials or gain privileged access to the platform. Research also shows that attackers were quickly reverse-engineering patches to identify and weaponize these weaknesses within days of release.

When combined, these issues enabled full server takeover scenarios, where attackers could move from application-level access to operating system control and potentially domain-level compromise in connected environments.

From an attacker’s perspective, this combination is ideal: SmarterMail is a network-exposed service, often holds a high trust position inside enterprise environments, and in many cases is monitored less aggressively than endpoint systems protected by EDR.

Advertisement

Once proof-of-concept exploit code becomes available, exploitation can be rapidly operationalized – meaning the timeline from vulnerability disclosure to ransomware deployment can shrink to days.

SmarterTools Breached by Own Product Flaw, Ransomware Groups Follow

Recent incidents demonstrate exactly how this pipeline plays out.

According to a SmarterTools report, SmarterTools was breached in January 2026 after attackers exploited an unpatched SmarterMail server running on an internal VM that was exposed inside their network.

The compromised environment included office and lab networks and a data-center segment connected through Active Directory, where attackers moved laterally and impacted around a dozen Windows servers.

Advertisement

The company shut down the affected infrastructure, restored systems from backup, rotated credentials, and removed some Windows/AD dependencies. Having said that, it was reported that core customer services and data were unaffected. Attackers gained an internal network foothold and attempted typical ransomware-style post-exploitation actions; it wasn’t successful, thanks to network segmentation.

In another investigation published by Bleeping Computer, ransomware operators gained initial access through SmarterMail vulnerabilities and waited before triggering encryption payloads, a classic affiliate behavior pattern.

This pattern is important:

  1. Initial access via email server vulnerability
  2. Credential harvesting or token extraction
  3. Lateral movement via Active Directory
  4. Persistence via scheduled tasks or DFIR tool abuse
  5. Ransomware deployment after staging period

Some campaigns have been linked to the Warlock ransomware group, with overlaps observed with nation-state-aligned activity clusters.

Flare monitors underground forums and Telegram channels where threat actors share PoCs, exploits, and compromised credentials within hours of disclosure.

Advertisement

Get early warning when your infrastructure is discussed or targeted by ransomware operators.

Start Free Trial

Email Servers: Identity Infrastructure Attackers Target First

Email servers sit at a unique intersection of trust and visibility.

They often provide:

  • Domain authentication tokens
  • Password reset capabilities
  • External communication channels
  • Access to internal contact graphs
  • Integration with identity and directory services

Attackers understand that email ecosystems rely on multi-component authentication chains where a single weak link can break overall trust. Compromise the email infrastructure and you effectively compromise identity.

1,200+ Vulnerable Servers Identified on Shodan

We found ~34,000 servers on Shodan with indications of running SmarterMail. Out of the 34,000, there were 17,754 unique servers.

Advertisement

A further inspection of these servers shows that 1,185 are vulnerable to authentication bypass or RCE flaws. Other publications talk about ~6,000 vulnerable servers.

A geo-location analysis of these 1,185 servers shows US dominance:

heat map

A further analysis of the ISPs and Organizations shows a very diverse distribution of open SmarterMail servers, many self-hosted admin panels, shared hosting, VPS providers, and general-purpose cloud networks, typical of deployment by individuals rather than organizations.

This may indicate that after the strong security hype over the past weeks, organizations were quick to react and block this attack surface.

Advertisement

Underground Forums Share Exploits Within Days of Disclosure

The underground ecosystems are fast to react to such publications. The CVEs were published around the beginning of January, and on the same day, there were mentions and references to these vulnerabilities. To date, we’ve seen dozens of publications and references to these vulnerabilities.

This is normal underground behavior when it comes to critical vulnerabilities.

We have also seen some more malicious references. A few days after the first publication, there were references to Proof of Concept or exploit of the vulnerabilities. For instance, an Arabic-speaking Telegram channel shows PoC.

Telegram POC in Arabic

You can also see how the threat actor is showing proof of concept:

Advertisement

And another threat actor is showing a proof of concept to this vulnerability:

In a Spanish-speaking Telegram group, we saw references to an Offensive Security Tool:

On another Telegram group, we saw a data dump of admin credentials highlighted as it comes from a compromised SmarterMail server:

When accessing one of the links, you can indeed see a long list of admin credentials and the domains (or login) to which they belong.

Advertisement

CISA Confirms Active Exploitation in Ransomware Campaigns

These vulnerabilities were published in the beginning of 2026, CISA added CVE-2026-24423 to the Known Exploited Vulnerabilities catalog in the beginning of February 2026, after confirming active ransomware exploitation.

This confirms that attackers are quick to exploit newly discovered critical RCE- related vulnerabilities:

  • Vulnerability disclosure
  • PoC written and released
  • Mass scanning operation
  • Weaponization: Data exfiltration, Ransomware etc.

Timeline shrinking from months/weeks to days.

How to Protect Email Infrastructure From Ransomware Access

Many organizations still treat email servers as “ONLY application infrastructure”. Well, they are not!

They are identity infrastructures that enable many follow-up attack vectors, as well as containing secrets and business logic. Defensive priorities should include:

Advertisement
  • Patch Urgency: Critical email server vulnerabilities should be treated like domain controller vulnerabilities.
  • Identity Telemetry: Organizations should monitor these environments for:
    • Admin password resets
    • API calls to external hosts
    • Unexpected outbound HTTP from mail servers
  • Network Segmentation: Email infrastructure should never have unrestricted access to internal networks.
  • Threat Hunting Practice:
    • API abuse patterns
    • Scheduled task persistence
    • Unexpected tooling like DFIR frameworks or remote admin tools

Email Servers Are Identity Infrastructure—Secure Them Accordingly

The SmarterMail cases show once again how modern cybercrime operations are quick to add newly discovered initial access to their ongoing operation.

It also re-emphasizes the critical role email servers take in the modern organization:

  • Identity brokers
  • Trust anchors
  • Business logic
  • Invaluable reconnaissance data for follow-up cybercrime

Organizations that continue treating them as just “messaging systems” will remain vulnerable to this new generation of intrusion pipelines.

Learn more by signing up for our free trial.

Sponsored and written by Flare.

Advertisement

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

How to Make a Killing review: a serial killer story should not be this boring

Published

on

Why you can trust TechRadar


We spend hours testing every product or service we review, so you can be sure you’re buying the best. Find out more about how we test.

How to Make a Killing was one of my most anticipated new movies of 2026. Unfortunately I was left feeling underwhelmed by A24’s latest venture, which doesn’t stand up against a catalog of greats.

Remakes are risky enough as it is, but Kind Hearts and Coronets is an especially tough act to follow. The iconic 40s movie brought something new to the table, with Alec Guinness especially stealing the show as he played eight members of the same wealthy family.

Advertisement

Source link

Advertisement
Continue Reading

Tech

The Top-Rated Luxury Tire Brand Is No Longer Michelin, According To JD Power

Published

on





A key part of the appeal of any great luxury car is its comfortable, smooth ride, but making the most of that ride will require the right tires. A 2025 study by JD Power surveyed luxury car owners to see which manufacturer delivered the most consistently satisfactory luxury car tires, with three manufacturers achieving scores above the segment average. In third place was Pirelli, the historic Italian tire company that’s now partly owned by Chinese investors. The second-place spot went to Michelin, with first place in the survey awarded to Goodyear.

This marks a reversal of fortune for the top two brands compared to 2024, when JD Power ranked Goodyear second and Michelin at the top of the table. The 2025 survey didn’t elaborate on the potential reasons behind Goodyear’s new, higher ranking. However, JD Power’s director, Jason Norton, was quoted as saying that “the overall experience of tire traction and handling during poor weather conditions […] is one of the top customer concerns.” He added that “a greater focus on quality” improved the chance that customers would become repeat customers of a tire brand.

The survey asked owners how happy they were with their tire purchases, based on four criteria. According to JD Power, the two most important areas were tire ride and tire wear, but handling and appearance were also taken into account in the ranking.

Advertisement

Bridgestone scored worst overall in the luxury category

At the other end of the luxury car tire rankings, JD Power’s least satisfactory brand was Bridgestone. It returned a score of 783, well below the segment average of 798 and significantly less than Goodyear’s score of 821. The Korean tire brand Hankook and Continental were joint second-least satisfying in the luxury category. Both scored 795 points, just below the segment average.

Goodyear’s score in the luxury tire category proved too high for its rivals to beat, but luxury car tires weren’t the only segment where the brand did well. It also took top spot in the passenger car tire category and achieved a second-place finish in the performance sport category. The only segment in which Goodyear didn’t perform well was the truck and utility category, where it received a score only marginally above the segment average. Thankfully, buyers looking for top-rated truck tires have a plethora of other options available, with JD Power ranking Hankook and Michelin as the most satisfactory brands in that category.

Advertisement



Source link

Advertisement
Continue Reading

Tech

Meta is bringing more international news to its AI

Published

on

Meta AI should soon be better at surfacing international news content thanks to a set of new deals with publishers. The company announced new agreements with international outlets and offered additional details on its recent deal with News Corp.

The latest deals bring French newspaper Le Figaro, Spanish media company Prisa and German newspaper Süddeutsche Zeitung into the fold. Together, along with News Corp, which runs a number of outlets in the UK, these sources should give Meta AI better access to timely info about world events. Meta didn’t disclose terms of the deals — The Wall Street Journal previously reported the News Corp arrangement was worth up to $50 million a year — but it said that it intends to link out to the relevant news sources.

“These integrations will also facilitate easier access to information by linking out to articles, allowing you to visit these partners’ websites for more details while providing value to partners, enabling them to reach new audiences,” Meta wrote in an update. The company has a long and sometimes fraught history with publishers as its priorities have shifted over the years. In the past, Meta has struck deals to pay publishers to produce live video and “instant articles” only to change course as news content has become less of a priority for Facebook.

Now, with Meta struggling to compete with its AI rivals, it seems the social media company is once again interested in news content. As the company notes in its blog post, Meta AI isn’t always great at surfacing accurate and timely info. I noted this in 2024 when the company’s assistant was repeatedly unable to accurately answer seemingly simple questions like ” who is the Speaker of the House of Representatives.”

Advertisement

By striking a bunch of deals with publishers, the company should be better equipped to handle these kinds of queries (and hopefully more complex ones). How much benefit publishers will see from these arrangements, however, is an open question. While Meta says it will link out to the relevant news sources, there are lots of outside data points that raise serious questions about the effect AI search tools are having on web traffic.

Source link

Continue Reading

Tech

Ford, Take Note: Classic Pickup Becomes The EV We Want

Published

on

Ford does sell an electric pickup, but not very many of them. We can’t say for sure, but it’s possible that if the F150 Lightning had the classic cool of [ScottenMotors] 1977 F150 SuperCab conversion they’d have better numbers.

The battery box sits where a V8 used to choke on well-meaning emissions controls.

On Reddit, [Scotten] shares the takeaways from his conversion effort, which involved a custom Tesla-cell battery pack and a new rear axle assembly to house the Tesla SDU (Small Drive Unit). A Large Drive Unit (LDU) would probably fit, but the SDU already puts out 264 HP, which compares rather favourably to the 156 HP this truck’s malaise-era V8 put out stock. The old F-bodies were great trucks in a lot of respects, but even an die-hard ICE enthusiast is probably not going to be sad to see that motor go.

Choosing to put the integrated drive unit in the rear axle complicates the build compared to other conversions that re-use the

Before the bed goes on, you can see the new rear axle with the Tesla SPU. There might be room for another, smaller battery under there.

stock transmission and differential, but saves you all the losses associated with that frankly unnecessary powertrain hardware.  The takeaway there is to figure out all the mechanical work on the chassis, because the EV stuff is actually the easy part. [Scotten] had the wheels turning a full year before he got the brakes figured out, because even if they’re just the rears and even if there’s regen– you want all the breaks to work on your test drive.

With the 100kW power pack, he’s getting about 220 miles of range. From the pictures, it looks like he’s filled up most of the hood space with that battery, but we can’t help but wonder if there’s room under the bed where the gas tank(s) lived to squeeze in more cells for those of us who need to go further.

Sadly the design isn’t open source, but [ScottenMotors] is apparently doing conversions on commission and open to selling kits; you can check that out on their website. In that, he’s following in the series-hybrid footsteps of Edison Motors.

Advertisement

While we respect the hustle to design an all-new rear end in this hack, you don’t even have to pull the internal combustion engine if you want to play on easy mode. You don’t need to be a nanoscience professor like [ScottenMotors] to pull off an electric truck, for the record– [Mr.G]’s high school class did a great job on a kei truck.

Thanks to [JohnU] for the tip!

Source link

Advertisement
Continue Reading

Tech

OpenAI reportedly plans to add Sora video generation to ChatGPT

Published

on

OpenAI plans to add its Sora video generation model directly into ChatGPT, The Information reports . The standalone Sora app was seen as a smash hit when it launched alongside Sora 2 in September 2025, but interest in the video generation app has fallen in the time since as users ran into limits on the amount and kinds of videos they could create.

Adding Sora to the ChatGPT could give the model a second life, and ideally grow the ChatGPT app’s weekly active users from the 900 million OpenAI reported in February, to a billion or more. According to The Information, the standalone Sora app will stick around after the model is integrated, even though the app has fallen out of the App Store’s top 100 free apps and only a small number of users reportedly share their videos publicly in the app.

It’s hard to pin down an exact number for what generating a video costs OpenAI, but the company charges API customers $0.10 per second for a 720p video, and in 2025, it was willing to give away 30 free video generations per account per a day in the Sora app. When you consider the even larger audience that could use the model in the ChatGPT app, things could get expensive fast. That could be one reason The Information reports OpenAI has projected it could spend over $225 billion on inference — the cost of running the company’s models — between 2026 and 2030.

The company has attempted to monetize the Sora app by having users pay for credits to generate new videos, and could deploy something similar once the model comes to ChatGPT. Maybe giving customers the ability to generate videos with Disney characters could even get people to pay for more videos once they run out of free generations. Whether or not adding Sora to ChatGPT moves the needle for OpenAI, though, the company will likely be spending even more money than it was before.

Advertisement

Source link

Continue Reading

Tech

‘Not built right the first time’ — Musk’s xAI is starting over again, again

Published

on

And then there were two: Of the original 11 co-founders who kickstarted xAI with Elon Musk three years ago, only two remain as the deep learning lab continues a personnel overhaul to compete with Anthropic and OpenAI. That rebuilding, insists Musk, is by design.

“xAI was not built right first time around, so is being rebuilt from the foundations up,” Musk said Thursday on his social media platform, X. By most measures, it isn’t going all that smoothly.

The most immediate pressure is competitive. This week, xAI co-founders Zihang Dai and Guodong Zhang left the outfit after Musk complained that the company’s AI coding tools were not effectively competing with Claude Code or Codex, rival programming assistants made by Anthropic and OpenAI, respectively. Musk said the company held an all-hands meeting on Wednesday that focused on how to catch up, which he predicted would be possible by the middle of this year.

Coding tools matter so much because they’re where the money is. While an early-year surge of users was powered by xAI’s lax regulation of Grok’s ability to produce sexual and even abusive imagery, coding tools are seen as the key revenue-generating tech for AI labs. That makes xAI’s current lag in this area more than a perception issue; it’s a business problem.

Advertisement

The personnel overhaul extends well beyond this week. A month ago, 11 senior engineers at xAI, including two co-founders, left the company following changes Musk described as a reorganization to suit a larger business. That effort was apparently insufficient: The Financial Times reported that SpaceX and Tesla executives have parachuted into the company to evaluate employees and fire those who don’t make the grade.

The two remaining co-founders, Manuel Kroiss and Ross Nordeen, along with Musk, have their work cut out for them.

Musk is now casting a wider net for talent. On Thursday, he said on X that he and another colleage, Baris Akis, are currently reviewing rejected employment applications in the company, with an eye toward reaching out to promising candidates who should have had a chance to interview. “My apologies,” Musk added, addressing the pile of strangers he’d ghosted.

Techcrunch event

Advertisement

San Francisco, CA
|
October 13-15, 2026

For the sake of comparison, LinkedIn reports that xAI has just over 5,000 employees, compared to more than 7,500 at OpenAI and more than 4,700 at Anthropic.

Advertisement

On the hiring front, there’s at least one encouraging sign. Andrew Milich and Jason Ginsberg are joining xAI from the AI coding tool company Cursor, where the two held joint responsibility for product engineering. Unlike xAI, Cursor depends on frontier labs for access to the AI models it runs on. Their decision to join xAI may signal the importance of direct access to LLM and computing resources to run them — and suggest that xAI’s core asset, its own frontier model, is still an attractive draw.

Either way, the pressure to show results is as much external as it is internal. Now that xAI is part of SpaceX, and with a public offering of SpaceX shares anticipated, the cash-burning unit is under pressure to demonstrate real uptake on Grok, its LLM. (A stumbling AI division is not the story Musk needs investors to be reading.)

Longer term, Musk is betting on something bigger than coding tools. xAI’s Macrohard project — Musk is convinced the name is “a funny reference to Microsoft” — aims to create an AI agent capable of doing anything a white-collar worker can do on a computer. Toby Pohlen, chosen to lead the project in February, left within weeks, and this week, Business Insider reported that Macrohard was on pause.

Musk’s response has been to draft another of his companies into the project. He revealed for the first time that Macrohard is a joint effort with Tesla, which is also developing a complementary agent dubbed “Digital Optimus” — a reference to Tesla’s Optimus humanoid robot. In Musk’s description, the xAI language model would direct the Tesla agent as it performs tasks.

Advertisement

It’s ambitious; it’s also not unique. Instead, the vision is not far off from what Perplexity — an AI-powered search engine — is doing with its new “Everything is Computer” offering, which aims to offer enterprise users a dedicated “digital proxy” that can orchestrate their digital tasks. It also echoes what entrepreneur Peter Steinberger is now working on at OpenAI, after creating OpenClaw’s popular personal agents.

Source link

Continue Reading

Tech

TUS launches AI-powered digital platform for professionals and employers

Published

on

The ReSHAPE platform, using AI, enables professionals to retrain, upskill and ‘future-proof’ their careers.

The Technological University of Shannon (TUS) in Athlone has launched the Regional Skills Horizon and Pathways to Employment (ReSHAPE) platform, which is an AI-powered digital platform developed to support professionals based in Ireland’s midlands region, supporting economic development in regions such as Laois, Offaly, Longford and Westmeath. 

ReSHAPE is a collaboration between Munster Technological University (MTU), TUS and the University of Limerick (UL) and is part of a strategic initiative aiming to deliver education, training and skills development opportunities.

Users of the platform will be able to undertake a skills audit, identify transferable skills and access funded training opportunities. Employers can use the platform to identify organisational skills gaps and create workforce development strategies. Reportedly, the programme is designed to support thousands of learners across the midlands. 

Advertisement

Commenting on the launch, Prof Vincent Cunnane, the president of TUS, said: “The platform represents a transformative opportunity for workers and employers across the region. ReSHAPE provides a powerful new tool to help individuals understand their capabilities and connect with education pathways that support sustainable careers in a rapidly evolving economy. 

“The midlands is entering a new phase of economic transformation and ensuring people have access to the right skills at the right time is critical.”

Prof Maggie Cusack, the president of MTU added: “The collaboration between universities and industry partners was key to ensuring the platform delivers meaningful impact. ReSHAPE brings together education providers, industry and communities to ensure skills development is aligned with real workforce needs. 

“By combining data-driven insights with accessible training pathways, the platform will help thousands of people across the midlands build the skills needed for the jobs of the future. ReSHAPE is also demonstrating that collaboration across higher education, industry and government can support better, evidence-based skills planning at a national level.”

Advertisement

Also in the midlands, Danish drug-maker Novo Nordisk recently announced a €432m investment at its Athlone-based plant to advance its manufacturing capacity for GLP-1 drugs. The Minister for Enterprise, Tourism and Employment Peter Burke, TD called the news, “a vote of confidence in Athlone, the midlands and the skilled workforce we have worked hard to develop”.

He said: “It will help drive innovation, create highly skilled jobs and further strengthen Ireland’s pharmaceutical ecosystem.” 

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Advertisement

Source link

Continue Reading

Tech

Two Lost ‘Doctor Who’ Episodes Found Intact in Waterlogged Collection

Published

on

Whovians, rejoice. The BBC is about to unlock a piece of Doctor Who history that even the TARDIS might have forgotten. Two lost episodes of Doctor Who, the iconic sci-fi series, will broadcast in April, the showrunner for the current season confirmed.

The two 1965 episodes, The Nightmare Begins and Devil’s Planet, were donated to the charitable trust Film Is Fabulous by the estate of an anonymous collector.

“The collector did recognize what he had, but how he acquired them has been lost to time,” Professor Justin Smith Leicester of De Montfort University, who led the recovery effort, told the broadcaster.

Advertisement

The researchers said that while most of the donor’s private collection was destroyed by water damage, the Doctor Who episodes were intact.

Doctor Who showrunner, Russell T Davies, celebrated the news on Instagram and said the episodes would air in the UK in April, though no US air date has been announced yet.

“Lost for 61 years! Best of all, these will be made available for FREE on the BBC iPlayer in April,” Davies wrote. 

Advertisement

He expressed gratitude to Film Is Fabulous for finding the lost episodes and encouraged people to donate to the registered charity. “Maybe they’ll find more! As the Doctor says… ‘Daleks!’” 

The episodes feature the first incarnation of the Doctor, played by William Hartnell, and a typical Dalek plot to take over Earth and the galaxy. 

In the 1960s and 1970s, the BBC had a policy of destroying film or reusing videotapes, leading to dozens of episodes of Doctor Who and other popular UK shows like Dad’s Army and Top of the Pops going missing.

Old Doctor Who episodes do surface occasionally, and in 2016, the newly discovered soundtrack for one storyline was turned into an animated series called The Power of the Daleks.

Advertisement

Meanwhile, Disney ended its working relationship with the BBC last year, and star Ncuti Gatwa left the show. However, the UK broadcaster says that Doctor Who will continue, and Russell T Davies is working on a new Christmas special.

Source link

Advertisement
Continue Reading

Tech

Instagram Discontinues End-To-End Encryption For DMs

Published

on

Meta plans to remove end-to-end encryption (E2EE) from Instagram direct messages by May 8, 2026. “Very few people were opting in to end-to-end encrypted messaging in DMs, so we’re removing this option from Instagram in the coming months,” says Meta. “Anyone who wants to keep messaging with end-to-end encryption can easily do that on WhatsApp.” The Hacker News reports: The American company first began testing E2EE for Instagram direct messages in 2021 as part of CEO Mark Zuckerberg’s “privacy-focused vision for social networking.” The feature is currently “only available in some areas” and is not enabled by default. Weeks into the Russo-Ukrainian war in February 2022, the company made encrypted direct messaging available to all adult users in both countries. Last week, TikTok said it would not introduce E2EE, arguing it makes users less safe by preventing police and safety teams from being able to read direct messages if needed.

Source link

Continue Reading

Tech

drive on some Samsung PCs

Published

on

Windows 11

Microsoft is investigating a new issue affecting some Samsung laptops running Windows 11 after installing the February 2026 security updates, in which users lose access to their C:\ drive and are unable to launch applications.

The company says it is working with Samsung to determine whether the problem is related to the Windows updates or Samsung software installed on affected devices.

“Users might encounter the error, ‘C:\ is not accessible – Access denied’, which prevents access to files and blocks the launch of some applications including Outlook, Office apps, web browsers, system utilities and Quick Assist,” explains Microsoft.

Microsoft says these errors can appear during normal Windows usage on a Samsung device, such as when accessing files, launching applications, or performing administrative tasks. In some cases, the permission problems can prevent users from elevating privileges, uninstalling updates, or accessing logs.

Advertisement

The problem has been reported mostly in Brazil, Portugal, South Korea, and India, and is primarily impacting Samsung Galaxy Book 4 and other Samsung consumer devices.

Microsoft says its latest investigation suggests the issue may be related to the Samsung Share application, though the exact root cause has not yet been confirmed.

At this time, the issue only impacts systems running Windows 11 version 25H2 and 24H2.

While Microsoft has not shared a temporary solution, a Reddit user claiming to be a Samsung technician in Brazil has posted a workaround that some affected users say restores access to the C:\ drive.

Advertisement

However, the workaround requires changing the ownership of the entire C:\ drive and all subfolders to the “Everyone” group, including system directories and files that are normally owned by TrustedInstaller or SYSTEM.

Changing ownership of system files in this way weakens Windows’ built-in security protections. Therefore, users should avoid applying the workaround unless absolutely necessary and instead wait for a fix from Microsoft.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025