Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Meta’s Metaverse leaves virtual reality

Lucid Motors cuts 12% of its workforce in pursuit of profits

BeyondTrust vulnerabilities used for web shells, backdoors, and data leaks

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » BeyondTrust vulnerabilities used for web shells, backdoors, and data leaks
Identity

BeyondTrust vulnerabilities used for web shells, backdoors, and data leaks

userBy userFebruary 20, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 20, 2026Vulnerability/Cyber ​​attack

Threat actors are exploiting recently disclosed critical security flaws affecting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products to

This vulnerability is tracked as CVE-2026-1731 (CVSS score: 9.9) and allows an attacker to execute operating system commands in the context of a site user.

In a report released Thursday, Palo Alto Networks Unit 42 said it has detected this security flaw being actively exploited in the wild for network reconnaissance, web shell deployment, command and control (C2), backdoor and remote management tool installation, lateral movement, and data theft.

The campaign targets financial services, legal services, high tech, higher education, wholesale and retail, and healthcare sectors in the United States, France, Germany, Australia, and Canada.

The cybersecurity firm describes the vulnerability as a case of sanitization failure, which allows an attacker to inject and execute arbitrary shell commands in the context of a site user by leveraging an affected “thin-scc-wrapper” script accessible via the WebSocket interface.

“While this account is separate from the root user, compromising it effectively gives an attacker control over the appliance’s configuration, managed sessions, and network traffic,” said security researcher Justin Moore.

Current attacks exploiting this flaw range from reconnaissance to backdoor deployment.

Access administrator accounts using custom Python scripts. Installs multiple web shells across directories, including a PHP backdoor that allows you to run raw or arbitrary PHP code without writing new files to disk, and a bash dropper that establishes a persistent web shell. Deploying malware such as VShell and Spark RAT. Uses out-of-band application security testing (OAST) techniques to verify successful code execution and fingerprinting of compromised systems. Run commands to stage, compress, and extract sensitive data such as configuration files, internal system databases, and complete PostgreSQL dumps to external servers.

“The relationship between CVE-2026-1731 and CVE-2024-12356 highlights localized and recurring challenges with input validation within separate execution paths,” Unit 42 said.

“While the insufficient validation in CVE-2024-12356 was due to the use of third-party software (postgres), the insufficient validation issue in CVE-2026-1731 was introduced in BeyondTrust Remote Support (RS) and older versions of the BeyondTrust Privileged Remote Access (PRA) codebase.”

CVE-2024-12356 has been exploited by Chinese-aligned attackers like Silk Typhoon, and the cybersecurity firm noted that CVE-2026-1731 could also be targeted by sophisticated attackers.

The development comes after the U.S. Cybersecurity and Infrastructure Security Agency (CISA) updated the CVE-2026-1731 entry in its Known Exploited Vulnerabilities (KEV) catalog, confirming that the bug has been exploited in a ransomware campaign.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhy investors are excited about solid-state transformers
Next Article Lucid Motors cuts 12% of its workforce in pursuit of profits
user
  • Website

Related Posts

Cline CLI 2.3.0 Supply Chain Attack Installs OpenClaw on Developer Systems

February 20, 2026

ClickFix campaign exploits compromised sites to deploy MIMICRAT RAT

February 20, 2026

New metrics shaping cyber insurance in 2026

February 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Meta’s Metaverse leaves virtual reality

Lucid Motors cuts 12% of its workforce in pursuit of profits

BeyondTrust vulnerabilities used for web shells, backdoors, and data leaks

Why investors are excited about solid-state transformers

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.