Cybersecurity

The IT Tool Hackers Are Using to Take Over Entire Corporate Networks

Published by

Security researchers have confirmed that a critical vulnerability in BeyondTrust products is being actively exploited in the wild, with attackers deploying web shells, backdoors, and other malicious tools across global networks. The flaw, tracked as CVE-2026-1731 and carrying a critical severity rating, affects BeyondTrust Remote Support and older versions of its Privileged Remote Access software, enabling unauthenticated attackers to execute arbitrary operating system commands without user interaction.

To those unfamiliar, CVE-2026-1731 is a serious security flaw found in older, unpatched versions of BeyondTrust remote support software. The problem exists in a part of the software that is directly exposed to the internet and is responsible for handling incoming connections.

Because of this flaw, attackers do not need a username or password to break in. They can remotely send commands to the affected system and make it run whatever instructions they want, effectively giving them full control. Security experts rate this vulnerability as extremely dangerous, with a score of 9.9 out of 10, because it is easy to exploit and can quickly lead to data theft, system damage, or complete takeover of the affected machine.

BeyondTrust published a security advisory and issued patches for the flaw on February 6, 2026, as part of its BT26-02 update, but multiple cybersecurity firms reported exploitation activity within 24 hours of a public proof-of-concept exploit being released. Researchers from Palo Alto Networks Unit 42 observed widespread use of the vulnerability for network reconnaissance, account creation, installation of command and control infrastructure, lateral movement, and data exfiltration.

Attackers have been seen deploying web shells that provide persistent remote access and the ability to execute code, as well as advanced backdoors and remote management tools. Malicious payloads such as SparkRAT and VShell have been delivered through compromised installations, and scanners are probing exposed instances for weak defense points.

The United States Cybersecurity and Infrastructure Security Agency has added CVE-2026-1731 to its Known Exploited Vulnerabilities catalog, urging federal and private sector organizations to prioritize remediation. Researchers warn that the attack surface is broad because BeyondTrust solutions are widely deployed for enterprise remote support and privileged session management, making the flaw a valuable target for threat actors seeking footholds in corporate and government networks.

Security analysts emphasize that while patches have been made available, many self-hosted installations remain vulnerable or unpatched, leaving organizations at risk of compromise. Because the flaw allows execution without credentials, it increases the potential impact on critical infrastructure, with threats already observed in sectors ranging from healthcare to legal services across multiple countries.

Defense experts recommend that organizations immediately apply official patches, avoid exposing BeyondTrust instances directly to the internet, and monitor for unusual traffic patterns indicative of reconnaissance or command and control activity.

The latest update comes from the U.S. Cybersecurity and Infrastructure Security Agency (CISA), which has revised its Known Exploited Vulnerabilities (KEV) catalog to highlight that CVE-2026-1731 is being actively used in ransomware attacks.

Abdul Wasay

Abdul Wasay explores emerging trends across AI, cybersecurity, startups and social media platforms in a way anyone can easily follow.