Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical BeyondTrust Vulnerability Exploited by Hackers

Critical BeyondTrust Vulnerability Exploited by Hackers

Posted on February 13, 2026 By CWS

Recent reports indicate that malicious actors have begun targeting a newly revealed security flaw in BeyondTrust’s Remote Support and Privileged Remote Access systems. This critical vulnerability, identified as CVE-2026-1731 with a CVSS score of 9.9, was observed being exploited in the wild by Ryan Dewhurst, head of threat intelligence at watchTowr. Hackers are taking advantage of this flaw by abusing the get_portal_info function, enabling them to extract sensitive data before creating a WebSocket connection.

Impact and Mitigation of CVE-2026-1731

The vulnerability allows attackers to perform remote code execution without authentication, posing a significant threat to affected systems. BeyondTrust has addressed this issue by releasing patches for their Remote Support and Privileged Remote Access products, specifically versions BT26-02-RS, 25.3.2, and BT26-02-PRA, 25.1.1 and later. With threat actors quickly exploiting new vulnerabilities, organizations must promptly implement these updates to safeguard their systems.

CISA’s Updated Vulnerability Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog to include four additional vulnerabilities, highlighting active exploitation evidence. Among these is CVE-2026-20700, a flaw in Apple’s operating systems that could allow arbitrary code execution, and CVE-2024-43468, an SQL injection vulnerability in Microsoft Configuration Manager. These entries underline the ongoing risk posed by unpatched vulnerabilities.

Microsoft’s Patch Tuesday in October 2024 addressed CVE-2024-43468, yet details about its exploitation in real-world scenarios remain scarce. The vulnerability is linked to a multi-stage intrusion involving SolarWinds Web Help Desk, although the exact exploitation methods are unclear.

Insights into Recent Exploitations

Another vulnerability, CVE-2025-15556, was linked to a sophisticated attack attributed to a China-based group known as Lotus Blossom. This involved a supply chain attack on Notepad++, leading to the distribution of a backdoor named Chrysalis. The compromise lasted from June to October 2025 and was characterized by its stealthy approach, as the attackers used trojanized installers to bypass source-code reviews.

The DomainTools Investigations team described the attack as a meticulous intelligence-gathering operation, emphasizing the attackers’ focus on maintaining low visibility while strategically targeting specific individuals and organizations. The campaign demonstrated the attackers’ capabilities to covertly access high-value targets through legitimate update mechanisms.

Future Security Implications

The ongoing exploitation of these vulnerabilities highlights the persistent threat posed by cyber attackers and the importance of timely patch management. Federal Civilian Executive Branch agencies have been given deadlines in early 2026 to address these security issues. As cyber threats continue to evolve, organizations must remain vigilant, ensuring that their systems are secure against emerging vulnerabilities through proactive measures and continuous monitoring.

The Hacker News Tags:BeyondTrust, CISA, CVE-2026-1731, cyber attack, Cybersecurity, data breach, Exploitation, remote code execution, security patch, Threat Actors, Vulnerability

Post navigation

Previous Post: OysterLoader: Advanced Malware with Obfuscation Tactics
Next Post: Hackers Exploit BeyondTrust Flaw Within 24 Hours of PoC

Related Posts

How to Deploy AI More Securely at Scale How to Deploy AI More Securely at Scale The Hacker News
Kali Linux Update, Chrome Threats & Security Risks Unveiled Kali Linux Update, Chrome Threats & Security Risks Unveiled The Hacker News
Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to 2M in Damages Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages The Hacker News
China-Linked DKnife Framework Exploits Routers for Attacks China-Linked DKnife Framework Exploits Routers for Attacks The Hacker News
Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign The Hacker News
Pen Testing for Compliance Only? It’s Time to Change Your Approach Pen Testing for Compliance Only? It’s Time to Change Your Approach The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability
  • Top AWS Monitoring Tools for Optimal Cloud Performance
  • North Korean IT Operative’s Elaborate Job Scam Exposed
  • DeepLoad Malware Exploits ClickFix for Credential Theft
  • Server Leak Uncovers TheGentlemen Ransomware Toolkit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability
  • Top AWS Monitoring Tools for Optimal Cloud Performance
  • North Korean IT Operative’s Elaborate Job Scam Exposed
  • DeepLoad Malware Exploits ClickFix for Credential Theft
  • Server Leak Uncovers TheGentlemen Ransomware Toolkit

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark