Cybersecurity Blogs and Articles
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityBlogsAttackers Abuse SolarWinds Web Help Desk to Install Zoho Agents and Velociraptor
Attackers Abuse SolarWinds Web Help Desk to Install Zoho Agents and Velociraptor
Cybersecurity

Attackers Abuse SolarWinds Web Help Desk to Install Zoho Agents and Velociraptor

•February 9, 2026
0
Security Affairs
Security Affairs•Feb 9, 2026

Why It Matters

The breach shows that unpatched IT service‑desk software can become a foothold for sophisticated threat actors, exposing entire enterprise networks to lateral movement and data exfiltration. Prompt patching and network segmentation are essential to prevent similar supply‑chain compromises.

Key Takeaways

  • •SolarWinds WHD flaws exploited for remote code execution
  • •Zoho ManageEngine agent installed for persistent remote access
  • •Velociraptor deployed as C2, communicating via Cloudflare Workers
  • •Defender and firewall disabled; malicious scheduled tasks created
  • •Update to WHD 2026.1 patches critical CVEs, stops exploitation

Pulse Analysis

The recent SolarWinds Web Help Desk (WHD) incidents underscore how quickly vulnerabilities in widely deployed service‑desk platforms can be weaponized. CVE‑2025‑40551 and CVE‑2025‑26399, both cataloged in CISA’s Known Exploited Vulnerabilities list, grant attackers arbitrary code execution through untrusted deserialization. Because WHD often runs with elevated privileges and integrates with internal ticketing workflows, a successful exploit provides a privileged foothold that can cascade across an organization’s IT ecosystem.

Threat actors in this campaign demonstrated a layered approach to persistence and control. After compromising WHD, they silently installed a Zoho ManageEngine RMM agent, granting continuous remote access without user interaction. They then deployed Velociraptor, a forensic‑grade endpoint tool, as a covert command‑and‑control (C2) channel, routing traffic through Cloudflare Workers to obscure the traffic’s origin. Simultaneously, the adversaries disabled native defenses such as Windows Defender and the firewall, created Cloudflare tunnels, and scheduled QEMU‑based tasks to survive reboots, illustrating a sophisticated blend of off‑the‑shelf tools and custom scripts.

For enterprises, the incident reinforces the urgency of a proactive patch management strategy and strict network segmentation. Upgrading WHD to version 2026.1 eliminates the known RCE flaws, while placing administrative interfaces behind VPNs or firewalls reduces exposure. Organizations should also audit service accounts, rotate credentials, and monitor for unauthorized remote‑management binaries. As supply‑chain attacks continue to evolve, combining timely vulnerability remediation with robust detection controls remains the most effective defense against similar multi‑vector intrusions.

Attackers abuse SolarWinds Web Help Desk to install Zoho agents and Velociraptor

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...