Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks

SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks

Posted on February 9, 2026 By CWS

Microsoft has identified a multi-stage cyber intrusion leveraging vulnerabilities in SolarWinds Web Help Desk (WHD) to gain unauthorized access to corporate networks. The attackers used these weaknesses to move laterally and target other critical assets within the affected organizations.

Details of the Exploitation

The Microsoft Defender Security Research Team has not yet confirmed which specific vulnerabilities were used in these attacks. The possibilities include either the recently disclosed vulnerabilities (CVE-2025-40551 and CVE-2025-40536) or a previously patched flaw (CVE-2025-26399). This ambiguity arises because the attacks occurred in December 2025, a time when systems were susceptible to both new and older vulnerabilities.

CVE-2025-40536 is known for enabling attackers to bypass security controls, potentially allowing unauthorized access to restricted features. On the other hand, CVE-2025-40551 and CVE-2025-26399 involve flaws related to untrusted data deserialization, which can result in remote code execution.

Impact and Techniques Used

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has acknowledged the active exploitation of CVE-2025-40551, urging federal agencies to implement necessary patches by February 6, 2026. Microsoft reports that successful exploitation of SolarWinds WHD led to unauthenticated remote code execution, enabling attackers to execute arbitrary commands within the application.

Upon gaining initial access, attackers employed PowerShell via BITS for payload deployment. They utilized legitimate software such as Zoho ManageEngine for persistent control over compromised systems, conducting actions like enumerating sensitive domain groups, establishing persistent access through reverse SSH and RDP, and attempting to schedule tasks to obscure their activities.

Preventive Measures and Recommendations

In some instances, attackers simulated Domain Controllers to extract password hashes and sensitive data from Active Directory. To mitigate these threats, Microsoft advises organizations to keep SolarWinds WHD instances updated, remove unauthorized remote monitoring tools, rotate service accounts, and isolate compromised systems.

This series of attacks highlights a prevalent and high-risk scenario where a single exposed application can lead to a full domain compromise if vulnerabilities are left unpatched. The attackers’ reliance on legitimate administrative tools and low-profile persistence techniques underscores the need for comprehensive security strategies, including timely patching and behavior-based detection across identity, endpoint, and network layers.

Organizations are urged to prioritize defense in-depth measures to protect against similar sophisticated cyber threats in the future.

The Hacker News Tags:CISA, CVE, Cybersecurity, endpoint security, Microsoft, RCE, remote code execution, SolarWinds, Vulnerability, Zoho ManageEngine

Post navigation

Previous Post: Discord Introduces Age-Restricted Features for Safer Use
Next Post: Ransomware Attack Exploits SmarterMail Vulnerability

Related Posts

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners The Hacker News
Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation The Hacker News
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin The Hacker News
AI Is Already the #1 Data Exfiltration Channel in the Enterprise AI Is Already the #1 Data Exfiltration Channel in the Enterprise The Hacker News
Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware The Hacker News
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Criminal IP Boosts IBM QRadar with Real-Time Threat Data
  • Ransomware Attack Exploits SmarterMail Vulnerability
  • SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks
  • Discord Introduces Age-Restricted Features for Safer Use
  • Major Cybersecurity M&A Deals in January 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Criminal IP Boosts IBM QRadar with Real-Time Threat Data
  • Ransomware Attack Exploits SmarterMail Vulnerability
  • SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks
  • Discord Introduces Age-Restricted Features for Safer Use
  • Major Cybersecurity M&A Deals in January 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark