BeyondTrust Flaw Sparks Global Web Shell Campaigns and Data Theft

TL;DR Summary
Threat actors are exploiting CVE-2026-1731 in BeyondTrust RS/PRA to run OS commands, deploy web shells and backdoors, establish C2, and exfiltrate data across sectors worldwide. Unit 42 reports use of a thin-scc-wrapper via WebSocket to execute commands in the site user context, effectively taking control of appliances and traffic. Campaigns include PHP backdoors, VShell, a bash dropper, and Spark RAT, with staged exfiltration of config files, internal databases, and PostgreSQL dumps. The activity aligns with prior CVE-2024-12356 issues, and CISA KEV confirms exploitation in ransomware operations.
- BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration The Hacker News
- VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731) Unit 42
- CISA: BeyondTrust RCE flaw now exploited in ransomware attacks BleepingComputer
- BeyondTrust Remote Support exploitation ramps up with backdoors, remote tools Cybersecurity Dive
- Hospitals at Risk of BeyondTrust Ransomware Hacks Bank Info Security
Reading Insights
Total Reads
1
Unique Readers
1
Time Saved
2 min
vs 3 min read
Condensed
80%
439 → 86 words
Want the full story? Read the original article
Read on The Hacker News