• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
beyondtrust flaw used for web shells, backdoors, and data exfiltration

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

You are here: Home / General Cyber Security News / BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration
February 20, 2026

Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to conduct a wide range of malicious actions, including deploying VShell and 

The vulnerability, tracked as CVE-2026-1731 (CVSS score: 9.9), allows attackers to execute operating system commands in the context of the site user.

In a report published Thursday, Palo Alto Networks Unit 42 said it detected the security flaw being actively exploited in the wild for network reconnaissance, web shell deployment, command-and-control (C2), backdoor and remote management tool installs, lateral movement, and data theft.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The campaign has targeted financial services, legal services, high technology, higher education, wholesale and retail, and healthcare sectors across the U.S., France, Germany, Australia, and Canada.

Cybersecurity

The cybersecurity company described the vulnerability as a case of sanitization failure that enables an attacker to leverage the affected “thin-scc-wrapper” script that’s reachable via WebSocket interface to inject and execute arbitrary shell commands in the context of the site user.

“While this account is distinct from the root user, compromising it effectively grants the attacker control over the appliance’s configuration, managed sessions and network traffic,” security researcher Justin Moore said.

The current scope of attacks exploiting the flaw range from reconnaissance to backdoor deployment –

  • Using a custom Python script to gain access to an administrative account.
  • Installing multiple web shells across directories, including a PHP backdoor that’s capable of executing raw PHP code or running arbitrary PHP code without writing new files to disk, as well as a bash dropper that establishes a persistent web shell.
  • Deploying malware such as VShell and Spark RAT.
  • Using out-of-band application security testing (OAST) techniques to validate successful code execution and fingerprint compromised systems.
  • Executing commands to stage, compress and exfiltrate sensitive data, including configuration files, internal system databases and a full PostgreSQL dump, to an external server.

“The relationship between CVE-2026-1731 and CVE-2024-12356 highlights a localized, recurring challenge with input validation within distinct execution pathways,” Unit 42 said.

Cybersecurity

“CVE-2024-12356’s insufficient validation was using third-party software (postgres), while CVE-2026-1731’s insufficient validation problem occurred in the BeyondTrust Remote Support (RS) and older versions of the BeyondTrust Privileged Remote Access (PRA) codebase.”

With CVE-2024-12356 exploited by China-nexus threat actors like Silk Typhoon, the cybersecurity company noted that CVE-2026-1731 could also be a target for sophisticated threat actors.

The development comes as the U.S. Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog entry for CVE-2026-1731 to confirm that the bug has been exploited in ransomware campaigns.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «cline cli 2.3.0 supply chain attack installed openclaw on developer Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration
  • Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems
  • ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT RAT
  • Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
  • Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case
  • FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025
  • Three Former Google Engineers Indicted Over Trade Secret Transfers to Iran
  • INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
  • Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center
  • PromptSpy Android Malware Abuses Google Gemini to Automate Recent-Apps Persistence

Copyright © TheCyberSecurity.News, All Rights Reserved.