Security researchers have identified active exploitation of a critical vulnerability in BeyondTrust's remote access software. On February 11, 2026, security firm Darktrace reported observing highly anomalous activity across multiple customer environments, beginning on February 10, that is consistent with the exploitation of this flaw. Threat actors are leveraging the vulnerability to gain an initial foothold on corporate networks, which is then used as a staging point for more severe attacks, including ransomware deployment. Evidence of exploitation includes compromised devices making suspicious DNS requests and outbound connections to Out-of-Band Application Security Testing (OAST) services, a common technique for exploit validation. The situation is critical, and all organizations using the affected BeyondTrust products are urged to apply the available patches immediately and initiate threat hunting activities.
The attack chain appears to follow a clear pattern:
Exploitation & Validation (T1190 - Exploit Public-Facing Application): The attacker exploits the vulnerability in an internet-facing BeyondTrust appliance. A key piece of evidence is the observed communication with OAST services (e.g., interact.sh, Canary Tokens). The exploit payload likely contains a command to force the compromised device to make a DNS or HTTP request to a unique OAST domain controlled by the attacker. When the attacker's OAST server receives this request, it confirms that their exploit was successful and that they have code execution on the victim's device.
Command and Control & Staging (T1071.001 - Web Protocols): Once the exploit is validated, the attacker establishes a more stable command-and-control channel. Darktrace observed activity labeled "Compromise / Possible Tunnelling to Bin Services," which suggests attackers are using covert channels or tunneling data through legitimate services to exfiltrate data or download second-stage tools.
Follow-on Attacks (T1486 - Data Encrypted for Impact): The initial access gained through the BeyondTrust vulnerability is then used as an entry point for ransomware deployment. The attackers likely perform internal reconnaissance, escalate privileges, and move laterally before deploying the ransomware payload across the network.
The use of OAST for exploit validation is a hallmark of a sophisticated and methodical attacker. It allows them to test their exploits at scale without revealing their primary C2 infrastructure.
A compromise of a privileged access tool like BeyondTrust is extremely severe. These tools are designed to have deep, persistent access to an organization's most critical systems. The impact includes:
| Type | Value | Description | Context |
|---|---|---|---|
| network_traffic_pattern | DNS/HTTP requests to OAST domains | Any outbound connection from a BeyondTrust appliance to known OAST providers (e.g., *.interact.sh, *.oast.pro, *.canarytokens.com) is a high-confidence indicator of an exploitation attempt. |
DNS query logs, Firewall logs, Web proxy logs |
| url_pattern | */api/config or similar |
Monitor for unusual requests to the BeyondTrust appliance's API endpoints, which could be part of an exploit chain. | Web server logs on the BeyondTrust appliance. |
| process_name | Anomalous child processes of BeyondTrust services | The main service processes for the BeyondTrust appliance should not be spawning shells (cmd.exe, bash) or scripting engines (powershell.exe). |
EDR telemetry on the appliance/server. |
Immediately apply the patches provided by BeyondTrust to remediate the critical vulnerability.
Mapped D3FEND Techniques:
Implement strict egress filtering to block connections to known OAST services and any other unauthorized external destinations from critical appliances.
Mapped D3FEND Techniques:
Do not expose privileged access management tools directly to the internet. Access should be brokered through a VPN or secure access gateway.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats