Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit BeyondTrust Flaw Within 24 Hours of PoC

Hackers Exploit BeyondTrust Flaw Within 24 Hours of PoC

Posted on February 13, 2026 By CWS

In a swift move, cybercriminals began exploiting a newly identified vulnerability in BeyondTrust software, just a day after a proof-of-concept (PoC) exploit emerged. This rapid attack underscores the critical nature of the flaw, labeled CVE-2026-1731, affecting both BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) systems.

Understanding the Vulnerability

The security gap, CVE-2026-1731, allows for unauthenticated remote code execution through specially crafted requests. On February 6, BeyondTrust issued patches to address this issue. Hacktron AI, the team behind the discovery in late January, highlighted the exposure of nearly 11,000 online instances, including roughly 8,500 on-premises setups at risk of potential exploitation.

This vulnerability poses significant risks due to the widespread use of BeyondTrust products in managing remote access and privileged sessions within enterprise environments, as noted by Hacktron AI. The potential impact of such a flaw is considerable, emphasizing the urgency for users to implement the patch.

Rapid Exploitation by Hackers

Only a few days later, on February 10, the PoC exploit was disclosed publicly, and within 24 hours, threat intelligence firm GreyNoise detected active attack attempts. Notably, one IP address, linked to a commercial VPN provider in Frankfurt, accounted for a majority (86%) of the reconnaissance activities observed.

This IP has been part of an established scanning operation since 2023, which quickly incorporated checks for CVE-2026-1731 into its routine. These activities are part of a broader pattern, with associated IPs previously targeting vulnerabilities in products like SonicWall, MOVEit, Apache, and Sophos, often using brute force tactics and default credentials.

Ongoing Threat Landscape

The exploit attempts have been confirmed by security firms WatchTowr and Defused, indicating active in-the-wild exploitation of the CVE-2026-1731 vulnerability. Historically, BeyondTrust vulnerabilities have attracted exploitation by various threat actors, including state-sponsored groups.

A notable instance involved the China-linked Silk Typhoon group, which reportedly exploited a BeyondTrust flaw in late 2024, targeting the US Department of the Treasury. GreyNoise’s data reveals that exploitation activities related to BeyondTrust vulnerabilities persisted at least until January 2026.

As hackers continue to target these vulnerabilities, it’s crucial for organizations using BeyondTrust products to apply patches promptly and stay vigilant against potential attacks.

Security Week News Tags:BeyondTrust, CVE-2026-1731, Cybersecurity, Exploit, GreyNoise, Hackers, Hacktron AI, PoC, remote code execution, Security, Threat Actors, Vulnerability

Post navigation

Previous Post: Critical BeyondTrust Vulnerability Exploited by Hackers
Next Post: AI-Powered Phishing and QR Code Threats Rise in 2025

Related Posts

Data Breach at Conduent Exposes Volvo Group Employees Data Breach at Conduent Exposes Volvo Group Employees Security Week News
Transportation Companies Hacked to Steal Cargo Transportation Companies Hacked to Steal Cargo Security Week News
New Reports Reinforce Cyberattack’s Role in Maduro Capture Blackout New Reports Reinforce Cyberattack’s Role in Maduro Capture Blackout Security Week News
Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently Qualcomm Flags Exploitation of Adreno GPU Flaws, Urges OEMs to Patch Urgently Security Week News
Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse Critical Vulnerabilities in PDF Platforms Addressed by Foxit and Apryse Security Week News
Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update Microsoft Addresses Six Zero-Day Vulnerabilities in February 2026 Update Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed
  • Critical Amazon Redshift JDBC Driver Flaw Exposes RCE Risk
  • Urgent Advisory: Exchange Server Zero-Day Exploited
  • Understand Your Real Attack Surface in 45 Days

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed
  • Critical Amazon Redshift JDBC Driver Flaw Exposes RCE Risk
  • Urgent Advisory: Exchange Server Zero-Day Exploited
  • Understand Your Real Attack Surface in 45 Days

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark