Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks

SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks

Posted on February 9, 2026 By CWS

Microsoft has identified a multi-stage cyber intrusion leveraging vulnerabilities in SolarWinds Web Help Desk (WHD) to gain unauthorized access to corporate networks. The attackers used these weaknesses to move laterally and target other critical assets within the affected organizations.

Details of the Exploitation

The Microsoft Defender Security Research Team has not yet confirmed which specific vulnerabilities were used in these attacks. The possibilities include either the recently disclosed vulnerabilities (CVE-2025-40551 and CVE-2025-40536) or a previously patched flaw (CVE-2025-26399). This ambiguity arises because the attacks occurred in December 2025, a time when systems were susceptible to both new and older vulnerabilities.

CVE-2025-40536 is known for enabling attackers to bypass security controls, potentially allowing unauthorized access to restricted features. On the other hand, CVE-2025-40551 and CVE-2025-26399 involve flaws related to untrusted data deserialization, which can result in remote code execution.

Impact and Techniques Used

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has acknowledged the active exploitation of CVE-2025-40551, urging federal agencies to implement necessary patches by February 6, 2026. Microsoft reports that successful exploitation of SolarWinds WHD led to unauthenticated remote code execution, enabling attackers to execute arbitrary commands within the application.

Upon gaining initial access, attackers employed PowerShell via BITS for payload deployment. They utilized legitimate software such as Zoho ManageEngine for persistent control over compromised systems, conducting actions like enumerating sensitive domain groups, establishing persistent access through reverse SSH and RDP, and attempting to schedule tasks to obscure their activities.

Preventive Measures and Recommendations

In some instances, attackers simulated Domain Controllers to extract password hashes and sensitive data from Active Directory. To mitigate these threats, Microsoft advises organizations to keep SolarWinds WHD instances updated, remove unauthorized remote monitoring tools, rotate service accounts, and isolate compromised systems.

This series of attacks highlights a prevalent and high-risk scenario where a single exposed application can lead to a full domain compromise if vulnerabilities are left unpatched. The attackers’ reliance on legitimate administrative tools and low-profile persistence techniques underscores the need for comprehensive security strategies, including timely patching and behavior-based detection across identity, endpoint, and network layers.

Organizations are urged to prioritize defense in-depth measures to protect against similar sophisticated cyber threats in the future.

The Hacker News Tags:CISA, CVE, Cybersecurity, endpoint security, Microsoft, RCE, remote code execution, SolarWinds, Vulnerability, Zoho ManageEngine

Post navigation

Previous Post: Discord Introduces Age-Restricted Features for Safer Use
Next Post: Ransomware Attack Exploits SmarterMail Vulnerability

Related Posts

Vulnerability in Claude Extension Exposes Users to XSS Attacks Vulnerability in Claude Extension Exposes Users to XSS Attacks The Hacker News
The MSP Cybersecurity Readiness Guide: Turning Security into Growth The MSP Cybersecurity Readiness Guide: Turning Security into Growth The Hacker News
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools The Hacker News
Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling The Hacker News
ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure The Hacker News
Critical BeyondTrust Vulnerability Exploited by Hackers Critical BeyondTrust Vulnerability Exploited by Hackers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark