Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»BeyondTrust Vulnerability Exploited in Ransomware Attacks
    Cybersecurity

    BeyondTrust Vulnerability Exploited in Ransomware Attacks

    adminBy adminFebruary 21, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    BeyondTrust vulnerability
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The cybersecurity agency CISA has updated its Known Exploited Vulnerabilities (KEV) catalog entry for the BeyondTrust product flaw CVE-2026-1731 to inform organizations about its exploitation in ransomware attacks.

    CVE-2026-1731 is a critical vulnerability affecting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) that can be exploited for unauthenticated remote code execution.

    In-the-wild exploitation of the vulnerability began within 24 hours of a PoC being made public on February 10. 

    CISA added the flaw to its KEV catalog on February 13 and instructed federal agencies to address it by February 16.

    CISA does not notify users when KEV entries are updated to indicate ransomware exploitation. However, a tool released recently by threat intelligence firm GreyNoise flags such changes and it revealed late on Thursday that the KEV entry for CVE-2026-1731 has been updated to warn that it has been leveraged in ransomware campaigns. 

    There do not appear to be any public reports linking the exploitation of CVE-2026-1731 to specific ransomware groups. 

    Advertisement. Scroll to continue reading.

    However, the cybersecurity community has been seeing evidence of the flaw being in the crosshairs of ransomware gangs. 

    SecureCyber, which called it “pre-ransomware positioning”, reported a few days ago that it had been “tracking ransomware crews who are circling defense contractors and local governments again trying to take advantage of [CVE-2026-1731]”. 

    Palo Alto Networks on Thursday said it has seen an increase in attacks exploiting the BeyondTrust vulnerability. 

    The security firm has observed attackers conducting reconnaissance, stealing data, moving laterally, and deploying web shells, remote management tools, and backdoors.

    Attacks have targeted organizations in the financial services, high-tech, healthcare, higher education, legal services, and retail sectors across the US, Canada, Australia, Germany, and France.

    Palo Alto Networks has mentioned the delivery of malware such as SparkRAT and the VShell Linux backdoor, but has not mentioned any ransomware attacks. 

    Related: CISA: Hackers Exploiting Vulnerability in Product of Taiwan Security Firm TeamT5

    Related: CISA Warns of Exploited SolarWinds, Notepad++, Microsoft Vulnerabilities

    Related: Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025

    attacks BeyondTrust Exploited ransomware vulnerability
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow to vibe-code an SEO tool without losing control of your LLM
    Next Article Data breach at French bank registry impacts 1.2 million accounts
    admin
    • Website

    Related Posts

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026

    CyberStrikeAI tool adopted by hackers for AI-powered attacks

    March 3, 2026

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026

    Building a competitive PPC defense

    March 3, 2026

    Amazon Prime Members Can Get Two of These E-Books Free in March 2026

    March 3, 2026

    CyberStrikeAI tool adopted by hackers for AI-powered attacks

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (570)
    • Privacy & Online Earning (79)
    • SEO & Digital Marketing (356)
    • Tech Tools & Mobile / Apps (706)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026

    Building a competitive PPC defense

    March 3, 2026

    Amazon Prime Members Can Get Two of These E-Books Free in March 2026

    March 3, 2026
    Most Popular
    • How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
    • Building a competitive PPC defense
    • Amazon Prime Members Can Get Two of These E-Books Free in March 2026
    • CyberStrikeAI tool adopted by hackers for AI-powered attacks
    • 16 Best Checking Accounts of March 2026
    • 3 great Paramount+ movies you’ll want to watch this week (March 2
    • Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure
    • Madison Square Garden Data Breach Confirmed Months After Hacker Attack
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.