Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

0
High
Exploitwebrce
Published: Mon Feb 09 2026 (02/09/2026, 14:42:00 UTC)
Source: The Hacker News

Description

Microsoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting internet‑exposed SolarWinds Web Help Desk (WHD) instances to obtain initial access and move laterally across the organization's network to other high-value assets. That said, the Microsoft Defender Security Research Team said it's not clear whether the activity weaponized recently

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 11:17:36 UTC

Technical Analysis

Microsoft observed a sophisticated multi-stage intrusion exploiting internet-exposed SolarWinds Web Help Desk (WHD) instances to gain initial access and move laterally within targeted networks. The attackers achieved unauthenticated remote code execution by exploiting critical vulnerabilities, including untrusted data deserialization flaws (CVE-2025-40551 with CVSS 9.8, CVE-2025-26399 with CVSS 9.8) and a security control bypass vulnerability (CVE-2025-40536 with CVSS 8.1). Due to overlapping vulnerabilities on compromised machines, the exact exploited CVE remains uncertain. Upon exploitation, attackers executed arbitrary commands within the WHD application context, spawning PowerShell to download payloads via Background Intelligent Transfer Service (BITS). They deployed legitimate Zoho ManageEngine RMM components to establish persistent remote control, enumerated sensitive Active Directory users and groups, and established persistence through reverse SSH and RDP. Advanced stealth techniques included creating scheduled tasks to launch QEMU virtual machines under SYSTEM privileges to conceal backdoors, and DLL side-loading using the legitimate Windows executable wab.exe to dump LSASS memory for credential theft. At least one DCSync attack was observed, simulating a Domain Controller to extract password hashes from Active Directory. Post-exploitation tools included Velociraptor (version 0.73.4) with a known privilege escalation vulnerability (CVE-2025-6264), Cloudflared tunnels for redundant command-and-control, and disabling of Windows Defender and Firewall via registry modifications. The attackers implemented failover mechanisms for their C2 infrastructure and used legitimate administrative tools to maintain low-noise persistence. Huntress researchers linked the infrastructure to previous intrusions involving ToolShell exploitation and Warlock ransomware. The campaign underscores the criticality of patching internet-facing SolarWinds WHD instances and monitoring for anomalous administrative tool usage and behavior-based indicators across identity, endpoint, and network layers.

Potential Impact

European organizations using SolarWinds Web Help Desk with internet-exposed instances face significant risk of initial compromise leading to full domain takeover. The exploitation enables attackers to execute arbitrary code without authentication, facilitating lateral movement, credential theft, and persistent remote access. Compromise of Active Directory through DCSync attacks can lead to widespread credential exposure, enabling attackers to access sensitive data, disrupt operations, or deploy ransomware. The use of legitimate administrative tools and stealthy persistence mechanisms complicates detection and response efforts. Disabling endpoint protection and firewall further increases exposure to follow-on attacks. The potential impact includes data breaches, operational disruption, reputational damage, and regulatory penalties under GDPR if personal data is compromised. Given the critical role of SolarWinds WHD in IT service management, exploitation can also disrupt IT support functions, exacerbating incident response challenges.

Mitigation Recommendations

1. Immediately identify and patch all SolarWinds Web Help Desk instances, prioritizing those exposed to the internet. 2. Conduct thorough network scans to detect unauthorized RMM tools such as Zoho ManageEngine and remove or isolate them if not sanctioned. 3. Rotate all service and administrative account credentials, especially those with domain or elevated privileges. 4. Implement network segmentation to isolate critical assets and limit lateral movement from compromised hosts. 5. Deploy behavior-based detection solutions that monitor for living-off-the-land techniques, unusual PowerShell usage, and anomalous scheduled tasks or VM launches. 6. Monitor Active Directory logs for signs of DCSync and other credential theft activities. 7. Harden endpoint security by ensuring Windows Defender and firewall settings cannot be disabled by unauthorized users. 8. Use multi-factor authentication (MFA) on all administrative accounts to reduce risk of credential misuse. 9. Regularly audit and restrict remote access methods such as SSH, RDP, and Cloudflare tunnels. 10. Establish incident response playbooks specifically addressing SolarWinds WHD exploitation scenarios and conduct tabletop exercises to improve readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/solarwinds-web-help-desk-exploited-for.html","fetched":true,"fetchedAt":"2026-02-10T11:16:38.824Z","wordCount":1472}

Threat ID: 698b13994b57a58fa1ff1300

Added to database: 2/10/2026, 11:16:41 AM

Last enriched: 2/10/2026, 11:17:36 AM

Last updated: 3/27/2026, 1:15:47 AM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses