Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical BeyondTrust Vulnerability Exploited by Hackers

Critical BeyondTrust Vulnerability Exploited by Hackers

Posted on February 13, 2026 By CWS

Recent reports indicate that malicious actors have begun targeting a newly revealed security flaw in BeyondTrust’s Remote Support and Privileged Remote Access systems. This critical vulnerability, identified as CVE-2026-1731 with a CVSS score of 9.9, was observed being exploited in the wild by Ryan Dewhurst, head of threat intelligence at watchTowr. Hackers are taking advantage of this flaw by abusing the get_portal_info function, enabling them to extract sensitive data before creating a WebSocket connection.

Impact and Mitigation of CVE-2026-1731

The vulnerability allows attackers to perform remote code execution without authentication, posing a significant threat to affected systems. BeyondTrust has addressed this issue by releasing patches for their Remote Support and Privileged Remote Access products, specifically versions BT26-02-RS, 25.3.2, and BT26-02-PRA, 25.1.1 and later. With threat actors quickly exploiting new vulnerabilities, organizations must promptly implement these updates to safeguard their systems.

CISA’s Updated Vulnerability Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog to include four additional vulnerabilities, highlighting active exploitation evidence. Among these is CVE-2026-20700, a flaw in Apple’s operating systems that could allow arbitrary code execution, and CVE-2024-43468, an SQL injection vulnerability in Microsoft Configuration Manager. These entries underline the ongoing risk posed by unpatched vulnerabilities.

Microsoft’s Patch Tuesday in October 2024 addressed CVE-2024-43468, yet details about its exploitation in real-world scenarios remain scarce. The vulnerability is linked to a multi-stage intrusion involving SolarWinds Web Help Desk, although the exact exploitation methods are unclear.

Insights into Recent Exploitations

Another vulnerability, CVE-2025-15556, was linked to a sophisticated attack attributed to a China-based group known as Lotus Blossom. This involved a supply chain attack on Notepad++, leading to the distribution of a backdoor named Chrysalis. The compromise lasted from June to October 2025 and was characterized by its stealthy approach, as the attackers used trojanized installers to bypass source-code reviews.

The DomainTools Investigations team described the attack as a meticulous intelligence-gathering operation, emphasizing the attackers’ focus on maintaining low visibility while strategically targeting specific individuals and organizations. The campaign demonstrated the attackers’ capabilities to covertly access high-value targets through legitimate update mechanisms.

Future Security Implications

The ongoing exploitation of these vulnerabilities highlights the persistent threat posed by cyber attackers and the importance of timely patch management. Federal Civilian Executive Branch agencies have been given deadlines in early 2026 to address these security issues. As cyber threats continue to evolve, organizations must remain vigilant, ensuring that their systems are secure against emerging vulnerabilities through proactive measures and continuous monitoring.

The Hacker News Tags:BeyondTrust, CISA, CVE-2026-1731, cyber attack, Cybersecurity, data breach, Exploitation, remote code execution, security patch, Threat Actors, Vulnerability

Post navigation

Previous Post: OysterLoader: Advanced Malware with Obfuscation Tactics
Next Post: Hackers Exploit BeyondTrust Flaw Within 24 Hours of PoC

Related Posts

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion The Hacker News
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale The Hacker News
NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems The Hacker News
React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors The Hacker News
JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers The Hacker News
Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Zimbra Enhances Security with Critical Update
  • Check Point Boosts AI Security with New Acquisitions
  • Malicious Chrome Extensions Threaten Business Security
  • Data Breach at Dutch Carrier Odido Affects Millions
  • Enhancing npm’s Supply Chain Security: Key Updates and Future Steps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Zimbra Enhances Security with Critical Update
  • Check Point Boosts AI Security with New Acquisitions
  • Malicious Chrome Extensions Threaten Business Security
  • Data Breach at Dutch Carrier Odido Affects Millions
  • Enhancing npm’s Supply Chain Security: Key Updates and Future Steps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News