Security researchers have identified active exploitation of a critical vulnerability in BeyondTrust's remote access software. On February 11, 2026, security firm Darktrace reported observing highly anomalous activity across multiple customer environments, beginning on February 10, that is consistent with the exploitation of this flaw. Threat actors are leveraging the vulnerability to gain an initial foothold on corporate networks, which is then used as a staging point for more severe attacks, including ransomware deployment. Evidence of exploitation includes compromised devices making suspicious DNS requests and outbound connections to Out-of-Band Application Security Testing (OAST) services, a common technique for exploit validation. The situation is critical, and all organizations using the affected BeyondTrust products are urged to apply the available patches immediately and initiate threat hunting activities.
The attack chain appears to follow a clear pattern:
Exploitation & Validation (T1190 - Exploit Public-Facing Application): The attacker exploits the vulnerability in an internet-facing BeyondTrust appliance. A key piece of evidence is the observed communication with OAST services (e.g., interact.sh, Canary Tokens). The exploit payload likely contains a command to force the compromised device to make a DNS or HTTP request to a unique OAST domain controlled by the attacker. When the attacker's OAST server receives this request, it confirms that their exploit was successful and that they have code execution on the victim's device.
Command and Control & Staging (T1071.001 - Web Protocols): Once the exploit is validated, the attacker establishes a more stable command-and-control channel. Darktrace observed activity labeled "Compromise / Possible Tunnelling to Bin Services," which suggests attackers are using covert channels or tunneling data through legitimate services to exfiltrate data or download second-stage tools.
Follow-on Attacks (T1486 - Data Encrypted for Impact): The initial access gained through the BeyondTrust vulnerability is then used as an entry point for ransomware deployment. The attackers likely perform internal reconnaissance, escalate privileges, and move laterally before deploying the ransomware payload across the network.
The use of OAST for exploit validation is a hallmark of a sophisticated and methodical attacker. It allows them to test their exploits at scale without revealing their primary C2 infrastructure.
A compromise of a privileged access tool like BeyondTrust is extremely severe. These tools are designed to have deep, persistent access to an organization's most critical systems. The impact includes:
*.interact.sh, *.oast.pro, *.canarytokens.com) is a high-confidence indicator of an exploitation attempt.*/api/config or similarcmd.exe, bash) or scripting engines (powershell.exe).Immediately apply the patches provided by BeyondTrust to remediate the critical vulnerability.
Mapped D3FEND Techniques:
Implement strict egress filtering to block connections to known OAST services and any other unauthorized external destinations from critical appliances.
Mapped D3FEND Techniques:
Do not expose privileged access management tools directly to the internet. Access should be brokered through a VPN or secure access gateway.
Mapped D3FEND Techniques:
Darktrace first observes anomalous activity related to the exploitation of the BeyondTrust vulnerability.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.