BeyondTrust RCE Exploited in the Wild: What You Need to Know
π¨ IMMEDIATE ACTION REQUIRED: CISA's remediation deadline is February 16, 2026βthat's tomorrow. If you run BeyondTrust Remote Support or Privileged Remote Access on-premises, stop reading and patch now. Then come back and check for compromise.
TL;DR β The 60-Second Briefing
- CVE-2026-1731: Pre-authentication RCE in BeyondTrust Remote Support and Privileged Remote Access
- CVSS Score: 9.9 (Critical) β No auth required, low complexity, network exploitable
- Active Exploitation: Confirmed since February 11, 2026 β within 24 hours of PoC release
- Silk Typhoon Connection: Variant of flaws used in the December 2024 U.S. Treasury breach
- Affected Systems: ~8,500 on-premises instances globally
- CISA KEV Deadline: February 16, 2026 (FCEB agencies), but everyone should treat this as mandatory
- Discovery: Found by Hacktron AI using AI-enabled variant analysis
If you're unpatched since February 6: Assume breach. Hunt for indicators. Patch immediately.

The Stakes: Why This Matters
BeyondTrust isn't just another software vendor. With 20,000+ customers including 75% of the Fortune 100, their Remote Support and Privileged Remote Access products sit at the most sensitive junction of enterprise networks: privileged access management (PAM).
Compromising a PAM solution is the security equivalent of stealing the master key to every door in a building. Attackers don't just get access to one systemβthey get the keys to everything.
This is exactly what happened in December 2024 when Silk Typhoon (the Chinese APT formerly known as Hafnium) exploited earlier BeyondTrust vulnerabilities to breach the U.S. Treasury Department, accessing:
- Office of Foreign Assets Control (OFAC) β sanctions intelligence
- Office of the Treasury Secretary β unclassified documents
- Multiple Treasury Department workstations
CVE-2026-1731 is a variant of those same vulnerabilities. Same attack surface. Same high-value target profile. Different code path.
If you're running BeyondTrust in healthcare, financial services, government, or any organization with sensitive data, attackers are already looking for you.
Technical Breakdown: How CVE-2026-1731 Works
Vulnerability Summary
| Attribute | Value |
|---|---|
| CVE ID | CVE-2026-1731 |
| CVSS v4 Score | 9.9 (Critical) |
| CWE | CWE-78 (OS Command Injection) |
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | None |
| User Interaction | None |
| Impact | Complete system compromise |
The Attack Chain
CVE-2026-1731 exploits improper input validation in BeyondTrust's request handling. Here's the simplified attack flow:
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β ATTACKER β
β β
β Step 1: GET /get_portal_info β
β β β
β Step 2: Extract X-Ns-Company header from response β
β β β
β Step 3: Establish WebSocket connection using company ID β
β β β
β Step 4: Execute arbitrary OS commands as site user β
β β β
β COMPLETE SYSTEM COMPROMISE β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
What makes this devastating:
- No authentication required β Attackers don't need valid credentials
- No user interaction β No phishing, no clicks needed
- Low complexity β Script-kiddie accessible once PoC is public
- WebSocket-based β May bypass some security controls
- Runs as site user β Immediate privileged access to PAM system
Affected Products and Versions
| Product | Vulnerable Versions | Fixed Versions |
|---|---|---|
| Remote Support (RS) | β€25.3.1 | Patch BT26-02-RS (v21.3-25.3.1) or v25.3.2+ |
| Privileged Remote Access (PRA) | β€24.3.4 | Patch BT26-02-PRA (v22.1-24.X) or v25.1.1+ |
Important: PRA versions 25.1 and later are NOT affected.
Cloud/SaaS customers: BeyondTrust auto-patched all SaaS deployments on February 2, 2026. If you're fully cloud-hosted, you should already be protectedβbut verify with BeyondTrust.
Self-hosted customers: You must manually apply patches. This is where the risk concentrates.
The 72-Hour Window: Timeline of a Disaster
The speed of exploitation on this vulnerability is a case study in why "patch Tuesday, exploit Wednesday" is no longer a memeβit's operational reality.
| Date | Event | Days from Disclosure |
|---|---|---|
| Jan 31, 2026 | Hacktron AI discovers vulnerability via AI variant analysis | -6 |
| Jan 31, 2026 | Responsible disclosure to BeyondTrust | -6 |
| Feb 2, 2026 | BeyondTrust patches SaaS and releases on-prem patches | -4 |
| Feb 6, 2026 | Public advisory and CVE publication (BT26-02) | 0 |
| Feb 10, 2026 | PoC published on GitHub by win3zz |
+4 |
| Feb 11, 2026 | First in-the-wild exploitation observed | +5 |
| Feb 12, 2026 | Reconnaissance activity surges (86% from single IP) | +6 |
| Feb 13, 2026 | CISA adds to KEV catalog | +7 |
| Feb 14, 2026 | Arctic Wolf reports SimpleHelp deployment attacks | +8 |
| Feb 16, 2026 | FCEB remediation deadline | +10 |
The brutal math:
- 4 days between public disclosure and PoC release
- 24 hours from PoC to active exploitation
- 72 hours from first exploitation to sophisticated post-exploitation (RMM deployment, AD enumeration)
If you weren't patched by February 10, you were potentially already being probed. By February 11, you were actively being exploited.
The AI Discovery: How Hacktron AI Found the Variant
This is the first major vulnerability discovered by AI-enabled variant analysis that's been actively exploited in the wild.
What Happened
Hacktron AI, a security research platform, analyzed the attack surface from the December 2024 Treasury breach (CVE-2024-12356 + CVE-2024-12686). Using pattern recognition and code flow analysis, their AI identified a new code path in the same vulnerable WebSocket endpoint that could achieve similar resultsβcommand injection without authentication.
Why This Matters for Defenders
AI is now on offense and defense.
The same techniques that helped Hacktron AI find CVE-2026-1731 are being used by threat actors to:
- Automatically discover variant vulnerabilities after patches
- Generate exploit code from vulnerability descriptions
- Scale vulnerability research beyond human capacity
This changes the calculus on patch windows. If AI can find variants faster than humans, the "safe period" after a patch shrinks dramatically.
Implication: When you patch one CVE in a product, assume variants exist and harden the entire attack surface.
Threat Actor Profile: Who's Exploiting This?
The Silk Typhoon Connection
CVE-2026-1731 is directly related to the vulnerabilities Silk Typhoon used in the Treasury breach:
| December 2024 | February 2026 |
|---|---|
| CVE-2024-12356 (CVSS 9.8) | CVE-2026-1731 (CVSS 9.9) |
| CVE-2024-12686 (CVSS 6.6) | β |
| Same WebSocket endpoint | Same WebSocket endpoint |
| Command injection | OS command injection |
| Exploited by Silk Typhoon | Variant of Silk Typhoon TTPs |
Timeline pattern:
Dec 2024: CVE-2024-12356 + 12686 β Silk Typhoon breaches Treasury
Jan 2025: Old exploit chain still being replayed (Polish IP)
Jan 2026: Hacktron AI finds variant via AI analysis
Feb 2026: CVE-2026-1731 weaponized within 24 hours of PoC
While we can't definitively attribute current exploitation to Silk Typhoon, the attack surface overlap is not coincidental.
Current Threat Actor Observations
Based on GreyNoise and Arctic Wolf telemetry:
| Actor Type | Behavior | Notes |
|---|---|---|
| Primary Scanner | 86% of reconnaissance from single IP | Commercial VPN (Frankfurt), active since 2023 |
| Multi-exploit operators | Same IPs targeting SonicWall, MOVEit, Log4j, Sophos | Opportunistic spray-and-pray |
| OAST operators | Using out-of-band callbacks to confirm vuln | More sophisticated operators |
| Residential IPs | Probing from home connections | Potential home-based operators or compromised residential networks |
TLS Fingerprint Match: GreyNoise observed the same TLS fingerprint (JA4+ MSS 1358) from actors still exploiting the old CVE-2024-12356 chainβnow scanning for CVE-2026-1731.
Post-Exploitation: What Happens After They Get In
Arctic Wolf's threat research team observed sophisticated post-exploitation activity following successful CVE-2026-1731 exploitation:
Attack Progression
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β INITIAL ACCESS β
β βββΊ CVE-2026-1731 exploitation via WebSocket β
β β
β PERSISTENCE β
β βββΊ SimpleHelp RMM deployed β
β - Binary renamed to "remote access.exe" β
β - Saved to C:\ProgramData\ β
β β
β DISCOVERY β
β βββΊ System enumeration β
β - systeminfo, ipconfig /all, net share β
β - AD enumeration via AdsiSearcher β
β β
β PRIVILEGE ESCALATION β
β βββΊ Domain account creation β
β - net user [USER] [PASS] /add /domain β
β - net group "enterprise admins" [USER] /add /domain β
β - net group "domain admins" [USER] /add /domain β
β β
β LATERAL MOVEMENT β
β βββΊ PSexec + Impacket SMBv2 β
β - SimpleHelp pushed to additional hosts β
β β
β OBJECTIVES β
β βββΊ Data exfiltration, ransomware staging, persistent access β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Why SimpleHelp?
Attackers are deploying SimpleHelp (a legitimate remote support tool) for persistence because:
- Signed binary β Less likely to trigger AV/EDR
- Legitimate use case β Blends with normal IT operations
- Full remote access β Keyboard, mouse, file transfer, command line
- Cross-platform β Works on Windows, Mac, Linux
This is a classic "living off the land" (LOL) technique, but with an externally-sourced legitimate tool instead of built-in OS utilities.
Indicators of Compromise (IOCs)
Network Indicators
| Indicator | Description | Priority |
|---|---|---|
/get_portal_info endpoint access |
Initial reconnaissance | High |
X-Ns-Company header extraction |
Company ID harvesting | High |
| WebSocket upgrade requests to BeyondTrust | Exploitation in progress | Critical |
| Connections on non-standard ports | Attackers know about port obfuscation | Medium |
| JA4+ MSS 1358 (vs standard 1460) | VPN tunnel encapsulation | Medium |
| Linux TCP stack fingerprint | 100% of observed scanning sessions | Low |
File System Artifacts
| Artifact | Location | Description |
|---|---|---|
remote access.exe |
C:\ProgramData\ |
Renamed SimpleHelp binary |
| SimpleHelp service | Service Manager | Persistence mechanism |
| New domain accounts | Active Directory | Created via net user /add /domain |
| PSexec artifacts | Various | Lateral movement tool |
| Impacket traces | Network logs | SMBv2 session setup requests |
Process Indicators
| Process/Command | Context | Detection Priority |
|---|---|---|
net user [USER] [PASS] /add /domain |
Account creation | Critical |
net group "enterprise admins" [USER] /add /domain |
Privilege escalation | Critical |
net group "domain admins" [USER] /add /domain |
Privilege escalation | Critical |
([adsiSearcher]"(ObjectClass=computer)").FindAll().count |
AD enumeration | High |
systeminfo, ipconfig /all, net share |
Discovery | Medium |
cmd.exe /c ver |
OS fingerprinting | Low |
SimpleHelp Post-Exploitation Identifiers
| Attribute | Value |
|---|---|
| File Description | "SimpleHelp Remote Access Client" |
| Common Filename | remote access.exe |
| Installation Path | C:\ProgramData\ |
| PE Metadata | Look for "SimpleHelp" in file properties |
Detection Rules
Suricata/Snort Rules
# Rule 1: BeyondTrust CVE-2026-1731 Reconnaissance
alert http $EXTERNAL_NET any -> $HOME_NET any (
msg:"BEYONDTRUST CVE-2026-1731 Reconnaissance - get_portal_info";
flow:to_server,established;
http.uri; content:"/get_portal_info";
classtype:attempted-recon;
sid:2026173101; rev:1;
)
# Rule 2: BeyondTrust CVE-2026-1731 WebSocket Exploitation
alert http $EXTERNAL_NET any -> $HOME_NET any (
msg:"BEYONDTRUST CVE-2026-1731 WebSocket Exploitation Attempt";
flow:to_server,established;
http.header; content:"Upgrade|3a| websocket";
http.header; content:"X-Ns-Company";
classtype:attempted-admin;
sid:2026173102; rev:1;
)
Splunk Queries
Query 1: BeyondTrust Suspicious Access Patterns
index=web sourcetype=*access*
(uri="/get_portal_info" OR uri_path="*websocket*")
| stats count by src_ip, uri, status
| where count > 5
| sort -count
Query 2: Domain Admin Group Modifications
index=windows EventCode=4728 OR EventCode=4732
(TargetUserName="Domain Admins" OR TargetUserName="Enterprise Admins")
| table _time, SubjectUserName, MemberName, TargetUserName, ComputerName
| sort -_time
Query 3: SimpleHelp Installation Detection
index=endpoint
(process_name="remote access.exe" OR
process_path="*\\ProgramData\\*" OR
process_command_line="*SimpleHelp*")
| table _time, host, user, process_name, process_path, parent_process
Microsoft Sentinel (KQL)
Query 1: SimpleHelp Post-Exploitation Detection
DeviceProcessEvents
| where FileName =~ "remote access.exe"
or ProcessCommandLine contains "SimpleHelp"
or InitiatingProcessFileName contains "bomgar"
| project Timestamp, DeviceName, ProcessCommandLine,
InitiatingProcessFileName, AccountName
| sort by Timestamp desc
Query 2: Suspicious Domain Account Creation
DeviceProcessEvents
| where ProcessCommandLine has_all ("net", "user", "/add", "/domain")
or ProcessCommandLine has_all ("net", "group", "admins", "/add")
| project Timestamp, DeviceName, ProcessCommandLine, AccountName
| sort by Timestamp desc
Query 3: AD Enumeration via AdsiSearcher
DeviceProcessEvents
| where ProcessCommandLine contains "adsiSearcher"
or ProcessCommandLine contains "ObjectClass=computer"
| project Timestamp, DeviceName, ProcessCommandLine, AccountName
Elastic/ELK Query
Lateral Movement and Privilege Escalation Detection
process.name:"net.exe" AND
process.command_line:(*"enterprise admins"* OR *"domain admins"* OR *"/add /domain"*)
GreyNoise Tracking
For real-time threat intelligence on scanners and exploitation attempts:
# GreyNoise Query
cve:CVE-2026-1731
GreyNoise Tag: BeyondTrust Remote Support Pre-Auth RCE CVE-2026-1731 Company Identifier Check
Remediation Steps: What To Do Right Now
Priority 1: IMMEDIATE (Next 2 Hours)
If you're reading this on February 15, 2026, you have less than 24 hours until the CISA deadline.
Step 1: Identify Your Exposure
# Check for BeyondTrust services
systemctl list-units | grep -i bomgar
systemctl list-units | grep -i beyondtrust
# Check installed versions (varies by install method)
ls -la /opt/bomgar/
cat /opt/bomgar/VERSION # if exists
For Windows:
# Check for BeyondTrust services
Get-Service | Where-Object {$_.Name -like "*bomgar*" -or $_.Name -like "*beyondtrust*"}
# Check version in registry
Get-ItemProperty "HKLM:\SOFTWARE\Bomgar\*" -ErrorAction SilentlyContinue
Step 2: Apply the Patch
Remote Support (RS):
- If running 21.3 through 25.3.1: Apply Patch BT26-02-RS
- Or upgrade to v25.3.2 or later
- Download from: BeyondTrust Support Portal
Privileged Remote Access (PRA):
- If running 22.1 through 24.X: Apply Patch BT26-02-PRA
- Or upgrade to v25.1.1 or later
- Note: PRA 25.1+ is not affected
Step 3: Verify Patching
After applying the patch:
# Verify service restarted
systemctl status beyondtrust-*
# Check version number matches fixed version
# Consult BeyondTrust docs for version verification method
Priority 2: THREAT HUNT (Next 24 Hours)
Assume compromise if you were unpatched since February 6.
Step 1: Search for Post-Exploitation Artifacts
# Look for SimpleHelp binaries
Get-ChildItem -Path C:\ProgramData\ -Recurse -File |
Where-Object {$_.Name -like "*remote access*" -or $_.Name -like "*simplehelp*"}
# Check for suspicious services
Get-Service | Where-Object {$_.DisplayName -like "*SimpleHelp*" -or $_.DisplayName -like "*Remote Access*"}
Step 2: Check for Unauthorized Domain Accounts
# Recently created domain accounts (last 14 days)
$cutoff = (Get-Date).AddDays(-14)
Get-ADUser -Filter {whenCreated -gt $cutoff} -Properties whenCreated |
Select-Object Name, SamAccountName, whenCreated
# Check Enterprise Admins group membership
Get-ADGroupMember "Enterprise Admins" | Select-Object Name, SamAccountName
# Check Domain Admins group membership
Get-ADGroupMember "Domain Admins" | Select-Object Name, SamAccountName
Step 3: Review BeyondTrust Logs
Check application logs for:
- Unusual login attempts
- API access from unexpected IPs
- Session anomalies around February 10-15
Priority 3: HARDEN (Next 7 Days)
Network Segmentation
- Restrict BeyondTrust access to known IP ranges
- Block inbound access from untrusted networks
- Monitor WebSocket connections for anomalies
- Implement network detection rules (see Detection Rules section)
Logging and Monitoring
- Enable verbose logging on BeyondTrust systems
- Forward logs to SIEM for analysis
- Set up alerts for IOCs listed above
- Monitor AD group changes (Event IDs 4728, 4732)
Incident Response Readiness
- Brief IR team on attack patterns
- Document BeyondTrust architecture (versions, network placement)
- Prepare containment procedures (isolation playbooks)
- Establish communication channels with BeyondTrust support
Priority 4: LONG-TERM (30 Days)
Review PAM Security Posture
- Audit internet exposure of all PAM solutions
- Implement MFA for all privileged access
- Review API key management (Treasury breach used stolen API key)
- Consider network isolation for PAM systems
Vulnerability Management Improvements
- Subscribe to BeyondTrust security advisories
- Monitor CISA KEV catalog for additions
- Prioritize PAM patching in your program
- Reduce patch-to-deploy time for critical assets
If You're Already Compromised
If your threat hunt reveals indicators of compromise:
Immediate Containment
- Isolate affected systems from the network
- Disable compromised accounts (especially new domain admins)
- Revoke BeyondTrust API keys and rotate credentials
- Preserve evidence (memory dumps, disk images, logs)
Investigation Scope
Assume attackers had:
- Access to all systems reachable via BeyondTrust
- Credentials for any saved sessions
- Visibility into privileged operations
- Potential persistence mechanisms beyond SimpleHelp
External Assistance
Consider engaging:
- Incident response firm (Arctic Wolf, Mandiant, CrowdStrike)
- BeyondTrust support (they may have additional IOCs)
- Law enforcement (FBI IC3) if significant data loss
Notification Requirements
Depending on your industry:
- HIPAA: Breach notification within 60 days
- PCI DSS: Notify card brands immediately
- SEC registrants: 8-K filing within 4 business days (material incidents)
- State breach laws: Vary by jurisdiction
Key Takeaways
For Security Teams
- Patch by EOD today β CISA deadline is tomorrow (Feb 16)
- Hunt for compromise β Exploitation started Feb 11; 4+ days of potential exposure
- Deploy detection rules β Use the Suricata, Splunk, and Sentinel queries provided
- Watch for SimpleHelp β Primary persistence mechanism observed
- Monitor domain changes β Attackers create new domain admin accounts rapidly
For CISOs
- This is Treasury-breach related β Same attack surface as Silk Typhoon's December 2024 operation
- PAM is a crown jewel β Compromising BeyondTrust = keys to the kingdom
- AI accelerates both sides β Variant analysis finds new vulns faster; exploit weaponization is near-instant
- 4-day patch windows are insufficient β Consider emergency patching processes for PAM/IAM
For Incident Responders
- Assume breach if unpatched since Feb 6 β Threat hunting should be standard procedure
- Post-exploitation is sophisticated β RMM deployment, AD enumeration, lateral movement observed
- Multiple actor types active β From opportunistic scanners to potential APT operators
- Check for persistence beyond BeyondTrust β SimpleHelp provides attacker-controlled remote access
Resources
Official Advisories
Threat Intelligence
- GreyNoise - Reconnaissance Analysis
- Arctic Wolf - Post-Exploitation Activity
- Hacktron AI - Discovery Details
Historical Context
About This Advisory
This article was compiled by the HackerNoob Research Team using intelligence from GreyNoise, Arctic Wolf, Hacktron AI, CISA, and BeyondTrust. Given the active exploitation and imminent CISA deadline, we've prioritized speed of publication while ensuring technical accuracy.
If this advisory helped your organization, consider sharing it with peers who may also be affected. The security community is stronger when we share intelligence quickly.
