Attackers abuse SolarWinds Web Help Desk to install Zoho agents and Velociraptor
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我得仔细阅读这篇文章,理解它的主要内容。 文章讲的是SolarWinds Web Help Desk被攻击者滥用,安装了Zoho代理和Velociraptor。Huntress确认了这个攻击活动,攻击者利用未修补的漏洞远程执行代码,安装Zoho工具以保持持久访问,并使用Velociraptor进行控制。他们还提到了具体的漏洞CVE编号,以及攻击者如何进行网络侦察和隐藏行为。 接下来,我需要提炼出关键信息:SolarWinds被攻击,安装Zoho和Velociraptor,远程控制和网络侦察。然后把这些信息浓缩到100字以内。 要注意用词简洁明了,确保所有重要点都被涵盖。比如“利用未修补漏洞”、“远程执行代码”、“安装Zoho工具”、“Velociraptor控制”、“网络侦察”等。 最后检查一下字数是否符合要求,并且语句通顺自然。 </think> SolarWinds Web Help Desk被攻击者滥用,通过未修补漏洞远程执行代码并安装Zoho工具和Velociraptor进行持久访问和控制。攻击者利用漏洞进行网络侦察和隐藏行为。 2026-2-9 12:28:54 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

Attackers abuse SolarWinds Web Help Desk to install Zoho agents and Velociraptor

Pierluigi Paganini February 09, 2026

Huntress confirmed active SolarWinds Web Help Desk exploits, where attackers installed Zoho tools for persistence, and used Velociraptor for control.

On February 7, 2026, Huntress investigated an active attack abusing SolarWinds Web Help Desk flaws. Attackers exploited unpatched versions to run code remotely, then quickly installed Zoho ManageEngine tools for persistent remote access and Cloudflare tunnels.

“This intrusion stemmed from the many recently disclosed vulnerabilities affecting SolarWinds WHD. The most critical vulnerabilities grant an adversary arbitrary code execution via untrusted deserialization — CVE-2025-40551 was recently added to CISA’s Known Exploited Vulnerabilities database, and CVE-2025-26399 was just recently discussed by Microsoft and other vendors who have also observed active in-the-wild exploitation.” reads the report published by Huntress. “They used Velociraptor to control systems and ran domain discovery commands to map networks. The activity confirms real-world exploitation of critical SolarWinds WHD vulnerabilities now tracked by CISA.”

Huntress observed active post-exploitation after attackers compromised SolarWinds Web Help Desk. The attack started from the WHD service, which silently installed a Zoho ManageEngine RMM agent to gain persistent remote access.

“Interestingly, the Zoho Assist agent was configured for unattended access, registering the compromised host to a Zoho Assist account tied to a Proton Mail address, esmahyft@proton[.]me.” continues the report. “Once the Zoho ManageEngine RMM agent was established, the threat actor wasted no time pivoting to hands-on-keyboard activity. Using the RMM agent process (TOOLSIQ.EXE) as their operational foothold, they executed Active Directory discovery commands to enumerate domain-joined machines via net group "domain computers" /do, a textbook reconnaissance technique aimed at identifying viable targets for lateral movement.”

Using this foothold, the attacker performed domain reconnaissance, then deployed Velociraptor as a command-and-control tool. Velociraptor was configured to communicate through Cloudflare Workers and included a failover C2 mechanism.

The attacker quickly ran a PowerShell script to collect detailed system information, including OS details, hardware data, domain membership, and installed updates. This data was formatted and sent to an attacker-controlled Elastic Cloud instance hosted on legitimate Google Cloud infrastructure, effectively giving the attacker a centralized dashboard to track and manage compromised systems using Kibana.

To avoid detection, they disabled Windows Defender and the Windows Firewall. They then installed Cloudflared tunnels to maintain hidden remote access and used PowerShell to execute additional commands and manage the system. To ensure long-term persistence, the attacker also created malicious scheduled tasks that abused QEMU to keep access even after reboots.

Below are mitigations provided by the Huntress, along with Indicators of Compromise (IoCs):

  • Update SolarWinds Web Help Desk to version 2026.1 or later, which addresses CVE-2025-26399CVE-2025-40536, and CVE-2025-40551. All prior versions should be considered vulnerable. See the SolarWinds upgrade guide for instructions.
  • WHD administrative interfaces should not be publicly accessible. Place WHD behind a VPN or firewall and remove direct internet access to admin paths.
  • Reset passwords for all service accounts, administrator accounts, and any credentials accessible through or stored within the WHD application.
  • Review WHD hosts for unauthorized remote access tools (Zoho Assist, Velociraptor, Cloudflared, VS Code tunnels), unexpected services, encoded PowerShell execution, and silent MSI installations spawned by the WHD service process (java.exe / wrapper.exe).

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, SolarWinds Web Help Desk)




文章来源: https://securityaffairs.com/187761/security/attackers-abuse-solarwinds-web-help-desk-to-install-zoho-agents-and-velociraptor.html
如有侵权请联系:admin#unsafe.sh