Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks

SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks

Posted on February 9, 2026 By CWS

Microsoft has identified a multi-stage cyber intrusion leveraging vulnerabilities in SolarWinds Web Help Desk (WHD) to gain unauthorized access to corporate networks. The attackers used these weaknesses to move laterally and target other critical assets within the affected organizations.

Details of the Exploitation

The Microsoft Defender Security Research Team has not yet confirmed which specific vulnerabilities were used in these attacks. The possibilities include either the recently disclosed vulnerabilities (CVE-2025-40551 and CVE-2025-40536) or a previously patched flaw (CVE-2025-26399). This ambiguity arises because the attacks occurred in December 2025, a time when systems were susceptible to both new and older vulnerabilities.

CVE-2025-40536 is known for enabling attackers to bypass security controls, potentially allowing unauthorized access to restricted features. On the other hand, CVE-2025-40551 and CVE-2025-26399 involve flaws related to untrusted data deserialization, which can result in remote code execution.

Impact and Techniques Used

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has acknowledged the active exploitation of CVE-2025-40551, urging federal agencies to implement necessary patches by February 6, 2026. Microsoft reports that successful exploitation of SolarWinds WHD led to unauthenticated remote code execution, enabling attackers to execute arbitrary commands within the application.

Upon gaining initial access, attackers employed PowerShell via BITS for payload deployment. They utilized legitimate software such as Zoho ManageEngine for persistent control over compromised systems, conducting actions like enumerating sensitive domain groups, establishing persistent access through reverse SSH and RDP, and attempting to schedule tasks to obscure their activities.

Preventive Measures and Recommendations

In some instances, attackers simulated Domain Controllers to extract password hashes and sensitive data from Active Directory. To mitigate these threats, Microsoft advises organizations to keep SolarWinds WHD instances updated, remove unauthorized remote monitoring tools, rotate service accounts, and isolate compromised systems.

This series of attacks highlights a prevalent and high-risk scenario where a single exposed application can lead to a full domain compromise if vulnerabilities are left unpatched. The attackers’ reliance on legitimate administrative tools and low-profile persistence techniques underscores the need for comprehensive security strategies, including timely patching and behavior-based detection across identity, endpoint, and network layers.

Organizations are urged to prioritize defense in-depth measures to protect against similar sophisticated cyber threats in the future.

The Hacker News Tags:CISA, CVE, Cybersecurity, endpoint security, Microsoft, RCE, remote code execution, SolarWinds, Vulnerability, Zoho ManageEngine

Post navigation

Previous Post: Discord Introduces Age-Restricted Features for Safer Use
Next Post: Ransomware Attack Exploits SmarterMail Vulnerability

Related Posts

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats The Hacker News
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises The Hacker News
Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets The Hacker News
Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution The Hacker News
State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability The Hacker News
New TETRA Radio Encryption Flaws Expose Law Enforcement Communications New TETRA Radio Encryption Flaws Expose Law Enforcement Communications The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Target Ivanti EPMM Devices with Hidden Backdoors
  • China-Linked Group Targets Singapore Telecom in Cyber Attack
  • Critical Roundcube Flaw Allows Email Tracking
  • Lema AI Secures $24M to Revolutionize Third-Party Risk
  • Criminal IP Boosts IBM QRadar with Real-Time Threat Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Target Ivanti EPMM Devices with Hidden Backdoors
  • China-Linked Group Targets Singapore Telecom in Cyber Attack
  • Critical Roundcube Flaw Allows Email Tracking
  • Lema AI Secures $24M to Revolutionize Third-Party Risk
  • Criminal IP Boosts IBM QRadar with Real-Time Threat Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark