Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Posted on February 20, 2026 By CWS

A critical security vulnerability has been identified in BeyondTrust’s Remote Support (RS) and Privileged Remote Access (PRA) products, posing significant risks across several industries. Exploited by threat actors, this flaw, designated as CVE-2026-1731 with a CVSS score of 9.9, enables the execution of operating system commands in the context of the site user.

Exploitation of CVE-2026-1731

According to a report released on Thursday by Palo Alto Networks Unit 42, the vulnerability is being actively exploited in various malicious campaigns. These include network reconnaissance, web shell deployment, command-and-control (C2) installation, and data theft. The sectors affected encompass financial services, legal services, high technology, higher education, wholesale and retail, and healthcare, impacting regions such as the U.S., France, Germany, Australia, and Canada.

The flaw arises from a failure in input sanitization, allowing attackers to manipulate the ‘thin-scc-wrapper’ script accessible via the WebSocket interface. This permits the execution of arbitrary shell commands as the site user, according to security researcher Justin Moore. Despite being distinct from the root user, compromising this account gives attackers significant control over the appliance’s configuration and managed sessions.

Techniques Used in Attacks

The exploitation techniques vary, ranging from reconnaissance to backdoor deployment. Attackers use custom Python scripts to access administrative accounts and install multiple web shells, including a PHP backdoor capable of executing raw PHP code. Additionally, a bash dropper establishes persistent web shells. Malware like VShell and Spark RAT has been deployed, utilizing out-of-band application security testing (OAST) techniques to confirm successful code execution and fingerprint compromised systems.

Attackers also execute commands to stage, compress, and exfiltrate sensitive data, including configuration files and a full PostgreSQL dump, to an external server. These activities highlight the sophisticated nature of the attacks exploiting this vulnerability.

Connection to Previous Vulnerabilities

The relationship between CVE-2026-1731 and a previous vulnerability, CVE-2024-12356, underscores recurring challenges in input validation. While CVE-2024-12356 involved issues with third-party software, the current vulnerability pertains specifically to BeyondTrust’s RS and PRA product lines. The previous vulnerability was targeted by China-nexus threat actors like Silk Typhoon, raising concerns that CVE-2026-1731 may attract similar attention.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include CVE-2026-1731, confirming its exploitation in ransomware campaigns. This development emphasizes the necessity for organizations to remain vigilant and implement robust security measures to mitigate potential threats.

The Hacker News Tags:Backdoors, BeyondTrust, CVE-2026-1731, cyber attack, Cybersecurity, data exfiltration, network security, Remote Support, Vulnerability, web shells

Post navigation

Previous Post: Critical Flaw in Grandstream VoIP Phones Exposes Networks
Next Post: Apache Tomcat Security Flaw Allows Constraint Bypass

Related Posts

Europol Dismantles 0 Million Cryptocurrency Fraud Network, Arrests Five Suspects Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects The Hacker News
Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider The Hacker News
Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension The Hacker News
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs The Hacker News
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign The Hacker News
Xinbi Telegram Market Tied to .4B in Crypto Crime, Romance Scams, North Korea Laundering Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Warns of Ploutus Malware Draining ATMs Nationwide
  • Engineers Charged in Silicon Valley Trade Secrets Case
  • Critical Flaws in VS Code Extensions Threaten Developers
  • Apache Tomcat Security Flaw Allows Constraint Bypass
  • Critical Flaw in BeyondTrust Exploited for Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News