Threat Brief - 2026-02-13
Threat Brief — February 13, 2026
Executive Summary
BeyondTrust CVE-2026-1731 is being actively exploited after PoC dropped—if you have internet-facing Remote Support or PRA instances, assume breach. Notepad++ supply chain attack revealed with Cobalt Strike delivery chains. Microsoft patched a trivially exploitable Notepad markdown RCE. Warlock ransomware hitting SmarterMail servers. Apple’s first 2026 zero-day added to CISA KEV.
1. BeyondTrust Remote Support / PRA Pre-Auth RCE
🔴 Critical · OS Command Injection · CVE-2026-1731 · PoC Available
Unauthenticated attackers can execute arbitrary OS commands via the get_portal_info WebSocket endpoint. Same endpoint as CVE-2024-12356 (used in US Treasury breach). Mass scanning began Feb 11; exploitation confirmed by watchTowr, GreyNoise, Defused Cyber.
Sources: Help Net Security · Rapid7 AttackerKB · BeyondTrust Advisory
TTPs
| Technique | Tactic | Observable |
|---|---|---|
| T1190 | Initial Access | WebSocket requests to /get_portal_info with shell metacharacters (;, |, $()) |
| T1059 | Execution | BeyondTrust service account spawning cmd.exe, powershell.exe, or bash |
IOCs
- Probing on non-standard ports (not just 443)
- WebSocket requests extracting
x-ns-companyvalue - Unusual child processes from BeyondTrust services
Detection
Log Sources: Web server access logs (BeyondTrust appliance), Network traffic (WebSocket connections), EDR for post-exploitation
Logic:
Look for:
- WebSocket connections to /get_portal_info from external IPs
- Parent: BeyondTrust services → Child: cmd.exe, powershell.exe, bash
- Outbound C2 connections following BeyondTrust service execution
Existing Coverage: None specific (gap). Generic T1190 rules may catch post-exploitation.
Action
🔴 Hunt immediately. If running on-prem BeyondTrust, assume compromise and investigate. SaaS was patched Feb 2.
2. Notepad++ Supply Chain Attack
🟡 High · Supply Chain Compromise · June–December 2025
Kaspersky analysis reveals attackers compromised Notepad++ update infrastructure, delivering Cobalt Strike Beacon via malicious NSIS installers → ProShow vulnerability exploit → Metasploit downloader → Cobalt Strike. Targeted government (Philippines), financial (El Salvador), IT (Vietnam).
Sources: Cybersecurity News · CISA KEV
TTPs
| Technique | Tactic | Observable |
|---|---|---|
| T1195.002 | Initial Access | GUP.exe (Notepad++ updater) downloading from attacker-controlled domain |
| T1059.001 | Execution | PowerShell spawned by GUP.exe for system recon |
| T1071.001 | C2 | HTTPS beacons to cdncheck.it[.]com |
IOCs
45.76.155[.]202/update/update.exe— Malicious update URL45.77.31[.]210/users/admin— Cobalt Strike stagingcdncheck.it[.]com— C2 domain- SHA1:
8e6e505438c21f3d281e1cc257abdbf7223b7f5a(update.exe) - SHA1:
defb05d5a91e4920c9e22de2d81c5dc9b95a9a7c(ProShow.exe) - Directory:
%appdata%\ProShow\
Detection
Log Sources: Sysmon (Process Create, File Create, DNS), EDR process telemetry, Network logs
Logic:
Look for:
- GUP.exe spawning unexpected children (curl.exe, powershell.exe)
- File creation in %appdata%\ProShow\
- DNS queries to cdncheck.it.com
- Connections to 45.76.155.202, 45.77.31.210
Existing Coverage:
Action
🟡 Deploy Sigma rules for GUP.exe abuse. Hunt for %appdata%\ProShow\ and connections to IOC domains since June 2025.
3. Windows Notepad Markdown RCE
🟡 High · Command Injection · CVE-2026-20841 · PoC Available
Notepad’s new Markdown rendering feature fails to constrain link handling. Ctrl-clicking a malicious link in a .md file executes unverified protocols, loading remote payloads. Trivially exploitable via social engineering.
Sources: CVE.news · The Register
TTPs
| Technique | Tactic | Observable |
|---|---|---|
| T1204.002 | Execution | User opens .md file and Ctrl-clicks malicious link |
| T1059 | Execution | notepad.exe spawning cmd.exe, powershell.exe, mshta.exe |
IOCs
.mdfiles with embeddedfile://,ms-msdt:, or custom protocol linksnotepad.exespawning unexpected child processes
Detection
Log Sources: Sysmon Event ID 1, Windows Security 4688, EDR process telemetry
Logic:
Look for:
- Parent: notepad.exe → Child: cmd.exe, powershell.exe, mshta.exe, wscript.exe
- File access: .md files opened followed by script interpreter execution
- Unusual URI protocol handlers being invoked
Existing Coverage: None specific (gap). Generic T1204.002 rules may trigger.
Action
🟡 Build detection for notepad.exe spawning suspicious children. Microsoft’s fix shows a warning but doesn’t block—social engineering can bypass.
4. Warlock Ransomware via SmarterMail
🔴 Critical · Ransomware Campaign · CVE-2026-23760 / CVE-2026-24423
Warlock (Storm-2603) exploited unpatched SmarterMail servers via auth bypass or direct RCE. They chain password reset API abuse with Volume Mount feature to deploy Velociraptor for persistence, then ransomware. SmarterTools confirmed breached Jan 29; CISA added to KEV.
Sources: Huntress Blog · The Register
TTPs
| Technique | Tactic | Observable |
|---|---|---|
| T1190 | Initial Access | Exploit SmarterMail password reset API from external IP |
| T1078 | Persistence | Unauthorized admin account creation via API |
| T1219 | C2 | velociraptor.exe execution, especially from msiexec.exe |
| T1486 | Impact | Ransomware encryption |
IOCs
- Velociraptor MSI from Supabase (
v4.msi) - New admin accounts via SmarterMail API
- Volume Mount feature abuse post-compromise
- Supabase domains serving payloads
Detection
Log Sources: SmarterMail application logs, Windows Event Logs (account creation, services), EDR, Network logs
Logic:
Look for:
- SmarterMail password reset API calls from external IPs
- velociraptor.exe execution (especially parent: msiexec.exe)
- New local/domain admin account creation
- Service installations by SYSTEM following SmarterMail activity
Existing Coverage:
Action
🔴 Patch immediately if running SmarterMail < build 9511. Hunt for Velociraptor artifacts and unauthorized admin accounts.
5. Apple dyld Zero-Day
🟡 High · Buffer Overflow · CVE-2026-20700 · CISA KEV Added Feb 13
Apple patched a decade-old iOS vulnerability in the dynamic linker (dyld) discovered by Google TAG. “Extremely sophisticated attack” targeting specific individuals. Details sparse.
Sources: CyberScoop · Apple Security Update
TTPs
| Technique | Tactic | Observable |
|---|---|---|
| T1203 | Execution | Exploitation for client execution via dyld |
| T1068 | Privilege Escalation | Memory corruption leading to elevated access |
Detection
Log Sources: Mobile EDR (if available), MDM logs, Network logs
Logic:
Limited endpoint visibility on mobile.
- Monitor for iOS devices connecting to unknown C2 post-update
- Unusual dyld behavior (requires mobile EDR)
Existing Coverage: None (mobile gap)
Action
🟡 Ensure iOS fleet is updated. No endpoint detection possible without mobile EDR.
6. UNC3886 Targeting Singapore Telecom
🟡 High · APT Campaign · China-nexus (UNC3886 / Fire Ant)
Singapore CSA disclosed 11-month Operation CYBER GUARDIAN against UNC3886, which targeted all four major telcos. APT deployed zero-day against perimeter firewall, rootkits on VMware ESXi/vCenter, and maintained persistent access.
Sources: Singapore CSA Advisory · Mandiant UNC3886 Report
TTPs
| Technique | Tactic | Observable |
|---|---|---|
| T1190 | Initial Access | Zero-day on perimeter firewall |
| T1014 | Defense Evasion | Rootkit on ESXi (malicious VIB with --force flag) |
| T1584 | Resource Dev | Compromise VMware infrastructure, modify ESX Admins group |
Detection
Log Sources: VMware ESXi/vCenter logs, Firewall logs, Network flow data, AD logs
Logic:
Look for:
- VIB installations with --force flag on ESXi
- Access to /etc/vmware/ or credential files
- vmtoolsd.exe spawning unexpected children
- ESX Admins group modifications in AD
Existing Coverage:
- ESXi Malicious VIB Forced Install (Splunk ESCU)
- Windows ESX Admins Group Creation (Splunk ESCU)
Action
🟡 Enable ESXi detection rules if running VMware. Hunt for VIB modifications and rootkit artifacts.
Priority Actions
- 🔴 BeyondTrust CVE-2026-1731 — Hunt for WebSocket exploitation. Assume breach if on-prem.
- 🔴 SmarterMail — Patch to build 9511. Hunt for Velociraptor and unauthorized accounts.
- 🟡 Notepad++ supply chain — Deploy Sigma rules. Hunt for GUP.exe anomalies since June 2025.
- 🟡 Notepad markdown RCE — Build
notepad.exe→ suspicious child detection. - 🟡 VMware/ESXi — Enable Splunk ESCU detection content for UNC3886 TTPs.