Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks

SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks

Posted on February 9, 2026 By CWS

Microsoft has identified a multi-stage cyber intrusion leveraging vulnerabilities in SolarWinds Web Help Desk (WHD) to gain unauthorized access to corporate networks. The attackers used these weaknesses to move laterally and target other critical assets within the affected organizations.

Details of the Exploitation

The Microsoft Defender Security Research Team has not yet confirmed which specific vulnerabilities were used in these attacks. The possibilities include either the recently disclosed vulnerabilities (CVE-2025-40551 and CVE-2025-40536) or a previously patched flaw (CVE-2025-26399). This ambiguity arises because the attacks occurred in December 2025, a time when systems were susceptible to both new and older vulnerabilities.

CVE-2025-40536 is known for enabling attackers to bypass security controls, potentially allowing unauthorized access to restricted features. On the other hand, CVE-2025-40551 and CVE-2025-26399 involve flaws related to untrusted data deserialization, which can result in remote code execution.

Impact and Techniques Used

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has acknowledged the active exploitation of CVE-2025-40551, urging federal agencies to implement necessary patches by February 6, 2026. Microsoft reports that successful exploitation of SolarWinds WHD led to unauthenticated remote code execution, enabling attackers to execute arbitrary commands within the application.

Upon gaining initial access, attackers employed PowerShell via BITS for payload deployment. They utilized legitimate software such as Zoho ManageEngine for persistent control over compromised systems, conducting actions like enumerating sensitive domain groups, establishing persistent access through reverse SSH and RDP, and attempting to schedule tasks to obscure their activities.

Preventive Measures and Recommendations

In some instances, attackers simulated Domain Controllers to extract password hashes and sensitive data from Active Directory. To mitigate these threats, Microsoft advises organizations to keep SolarWinds WHD instances updated, remove unauthorized remote monitoring tools, rotate service accounts, and isolate compromised systems.

This series of attacks highlights a prevalent and high-risk scenario where a single exposed application can lead to a full domain compromise if vulnerabilities are left unpatched. The attackers’ reliance on legitimate administrative tools and low-profile persistence techniques underscores the need for comprehensive security strategies, including timely patching and behavior-based detection across identity, endpoint, and network layers.

Organizations are urged to prioritize defense in-depth measures to protect against similar sophisticated cyber threats in the future.

The Hacker News Tags:CISA, CVE, Cybersecurity, endpoint security, Microsoft, RCE, remote code execution, SolarWinds, Vulnerability, Zoho ManageEngine

Post navigation

Previous Post: Discord Introduces Age-Restricted Features for Safer Use
Next Post: Ransomware Attack Exploits SmarterMail Vulnerability

Related Posts

Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories The Hacker News
Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files The Hacker News
What Security Leaders Need to Know in 2025 What Security Leaders Need to Know in 2025 The Hacker News
Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs Mustang Panda Deploys SnakeDisk USB Worm to Deliver Yokai Backdoor on Thailand IPs The Hacker News
Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware The Hacker News
Security Risks in Popular VS Code Extensions Identified Security Risks in Popular VS Code Extensions Identified The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark