Hackers are exploiting SolarWinds Net Assist Desk (WHD) vulnerabilities to deploy official instruments for malicious functions, such because the Zoho ManageEngine distant monitoring and administration instrument.
The attacker focused at the very least three organizations and likewise leveraged Cloudflare tunnels for persistence, and the Velociraptor cyber incident response instrument for command and management (C2).
The malicious exercise was noticed over the weekend by researchers at Huntress Safety, who consider that it’s a part of a marketing campaign that began on January 16 and leveraged not too long ago disclosed SolarWinds WHD flaws.
“On February 7, 2026, Huntress SOC analyst Dipo Rodipe investigated a case of SolarWinds Net Assist Desk exploitation, by which the menace actor quickly deployed Zoho Conferences and Cloudflare tunnels for persistence, in addition to Velociraptor for technique of command and management,” Huntress says.
In line with the cybersecurity firm, the menace actor exploited the CVE-2025-40551 vulnerability, which CISA flagged final week as being utilized in assaults, and CVE-2025-26399.
Each safety issues obtained a important severity score and can be utilized to attain distant code execution on the host machine with out authentication.
It’s price noting that Microsoft safety researchers additionally “noticed a multi‑stage intrusion the place menace actors exploited web‑uncovered SolarWinds Net Assist Desk (WHD) situations,” however they didn’t affirm exploitation of the 2 vulnerabilities.
Assault chain and gear deployment
After gaining preliminary entry, the attacker put in the Zoho ManageEngine Help agent by way of an MSI file fetched from the Catbox file-hosting platform. They configured the instrument for unattended entry and registered the compromised host to a Zoho Help account tied to an nameless Proton Mail handle.
The instrument is used for direct hands-on keyboard exercise and Lively Listing (AD) reconnaissance. It was additionally used to deploy Velociraptor, fetched as an MSI file from a Supabase bucket.
Velociraptor is a official digital forensics and incident response (DFIR) instrument that Cisco Talos not too long ago warned was being abused in ransomware assaults.
Within the assaults noticed by Huntress, the DFIR platform is used as a command-and-control (C2) framework that communicates with attackers by way of Cloudflare Employees.
The researchers notice that the attacker used an outdated model of the Velociraptor, 0.73.4, which is susceptible to a privilege escalation flaw that permits growing permissions on the host.
The menace actor additionally put in Cloudflared from Cloudflare’s official GitHub repository, utilizing it as a secondary tunnel-based entry channel for C2 redundancy.
In some circumstances, persistence was additionally achieved by way of a scheduled process (TPMProfiler) that opens an SSH backdoor by way of QEMU.
The attackers additionally disabled Home windows Defender and Firewall by way of registry modifications to be sure that fetching further payloads wouldn’t be blocked.
“Roughly a second after disabling Defender, the menace actor downloaded a recent copy of the VS Code binary,” the researchers say.

Supply: Huntress
Safety updates and mitigation
System directors are really useful to improve SolarWinds Net Assist Desk to model 2026.1 or later, take away public web entry to SolarWinds WHD admin interfaces, and reset all credentials related to the product.
Huntress additionally shared Sigma guidelines and indicators of compromise to assist detect Zoho Help, Velociraptor, Cloudflared, and VS Code tunnel exercise, silent MSI installations, and encoded PowerShell execution.
Neither Microsoft nor Huntress attributed the noticed assaults to any particular menace teams, and nothing in regards to the targets was disclosed past Microsoft characterizing the breached environments as “high-value belongings.”
Trendy IT infrastructure strikes quicker than handbook workflows can deal with.
On this new Tines information, find out how your workforce can cut back hidden handbook delays, enhance reliability by means of automated response, and construct and scale clever workflows on prime of instruments you already use.


