Cyber Threat Brief — February 20, 2026

⚠️ This report is AI-generated. Always validate findings.

Cyber Threat Brief — February 20, 2026

A daily intelligence digest for detection engineers and threat hunters.


1. BeyondTrust CVE-2026-1731 — VShell & SparkRAT Post-Exploitation (UPDATE)

What’s New

Unit 42 published detailed post-exploitation TTPs from ongoing BeyondTrust Remote Support exploitation, including deployment of VShell and SparkRAT backdoors, sophisticated web shells, and DNS tunneling for C2 evasion.

See Feb 13 brief for initial vulnerability analysis.

Technical Details

FieldValue
CVECVE-2026-1731
CVSS9.9
AffectedBeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)
Exposed Instances10,600+ (Cortex Xpanse)
Targeted SectorsFinancial services, Legal, High-tech, Higher Ed, Healthcare
Targeted RegionsUS, France, Germany, Australia, Canada

New Post-Exploitation Activity:

  • Administrative Takeover: Custom Python script backs up admin password hash, injects new hash for 60-second access window, self-destructs
  • Web Shells: Password-protected PHP web shells including aws.php with China Chopper/AntSword-style delimiters
  • Config STOMPing: Bash dropper modifies Apache config in memory while keeping disk config clean
  • Backdoors: VShell (fileless Linux backdoor), SparkRAT (cross-platform Go RAT)
  • C2 Evasion: DNS tunneling via OAST techniques to oastify[.]com domains

TTPs

TacticTechniqueObservable
Initial AccessT1190 - Exploit Public-Facing AppWebSocket to thin-scc-wrapper with crafted remoteVersion
ExecutionT1059.006 - PythonAdmin takeover script with sqlite3, check_auth binary
PersistenceT1505.003 - Web ShellPHP backdoors (aws.php, file_save.php) with eval()
Defense EvasionT1070.004 - File DeletionScript self-destructs, config STOMPing hides Apache changes
Defense EvasionT1572 - Protocol TunnelingDNS tunneling to OAST domains for C2/exfil
C2T1071.004 - DNSHostname encoded in subdomain for covert comms
ExfiltrationT1041 - Exfil Over C2PostgreSQL dumps, config files compressed and transmitted

Detection Opportunities

# Web shell detection - PHP eval with POST parameter
process_name="php*" AND command_line="*eval*" AND http_method="POST"

# DNS tunneling via nslookup (hostname hex-encoded in subdomain)
process_name="nslookup" AND dns_query_name MATCHES "[a-f0-9]{10,}\\..*\\.oastify\\.com"

# PowerShell DNS exfil with BitConverter encoding
process_name="powershell*" AND command_line="*BitConverter*" AND command_line="*nslookup*"

# SparkRAT user-agent detection
http_user_agent="SPARK-COMMIT"

# VShell file pattern detection (unusually long filenames)
file_name_length > 100 AND file_path="/tmp/*"

Log Sources

  • Web server access logs (Apache, IIS)
  • DNS query logs (passive DNS, Zeek)
  • Sysmon Event ID 1 (Process Creation), 22 (DNS Query)
  • Network proxy logs with user-agent tracking
  • EDR telemetry for fileless execution

Detection Coverage

SourceStatus
Sigma✅ SparkRAT UA, VShell filename patterns
Splunk ESCU❌ Gap — No specific BeyondTrust exploitation detection
Elastic❌ Gap — No VShell/SparkRAT rules

Recommendation: Build detections for PHP web shells using eval() with specific POST parameter patterns. Add DNS tunneling detection for OAST domains.

Sources


2. VS Code Extension Vulnerabilities — 128M+ Downloads Affected

What’s New

Four critical to high-severity vulnerabilities in popular VS Code extensions enable remote code execution and file exfiltration. Maintainers unresponsive to responsible disclosure since July 2025.

Technical Details

FieldValue
CVECVE-2025-65717, CVE-2025-65716, CVE-2025-65715
CVSS9.1 (Critical), 8.8 (High), 7.8 (High)
Affected ExtensionsLive Server (72M), Markdown Preview Enhanced (8.5M), Code Runner (37M), Microsoft Live Preview (11M)
Total Downloads128+ million
Patch StatusUnpatched (except MS Live Preview silently fixed in v0.4.16)

Vulnerability Details:

  • CVE-2025-65717 (Critical 9.1): Live Server allows remote file exfiltration via malicious link while server is running
  • CVE-2025-65716 (High 8.8): Markdown Preview Enhanced executes arbitrary JavaScript in HTML tags, enables network scanning
  • CVE-2025-65715 (High 7.8): Code Runner allows RCE through malicious settings.json modification
  • MS Live Preview: localhost requests can enumerate and exfiltrate files when extension is active

TTPs

TacticTechniqueObservable
Initial AccessT1566.002 - Spearphishing LinkMalicious link sent while dev has Live Server running
ExecutionT1204.002 - Malicious FileCrafted Markdown file with embedded JS
CollectionT1005 - Data from Local SystemFile enumeration via localhost requests
ExfiltrationT1567 - Exfil Over Web ServiceData sent to attacker-controlled server

Detection Opportunities

# Detect localhost connections to unexpected ports (Live Server default 5500)
network_direction="outbound" AND dest_ip="127.0.0.1" AND dest_port IN (5500, 5501, 3000)

# Detect VS Code extensions making external connections
process_parent_name="Code.exe" AND network_direction="outbound" AND dest_ip NOT IN (internal_ranges)

# Code Runner suspicious execution
process_name="node.exe" AND process_parent_name="Code.exe" AND command_line="*-e*"

# Markdown file with embedded script tags
file_extension=".md" AND file_content MATCHES "<script.*>.*</script>"

Log Sources

  • EDR telemetry (process trees, network connections)
  • Web proxy logs
  • VS Code extension logs
  • Network flow data

Detection Coverage

SourceStatus
Sigma❌ Gap — No VS Code extension-specific rules
Splunk ESCU❌ Gap — No IDE supply chain detections
Elastic❌ Gap — Limited developer tool coverage

Recommendation: Until patches are available, disable Live Server extension when not actively using it. Avoid opening untrusted Markdown files.

Sources


3. Cline Supply Chain Attack — AI Triage Bot Weaponized

What’s New

An attacker exploited prompt injection in Cline’s AI issue triage bot to steal npm credentials and publish a malicious package version, installing OpenClaw on developer machines for 8 hours. The attack chain (dubbed “Clinejection”) demonstrates AI agents as the new CI/CD attack surface.

Technical Details

FieldValue
AffectedCline CLI v2.3.0 (npm)
Users ImpactedDevelopers who updated during 8-hour window
PayloadGlobal OpenClaw installation via postinstall script
Attack VectorGitHub issue title → prompt injection → cache poisoning → credential theft
DisclosureFeb 9, 2026 (Adnan Khan)
ExploitationFeb 17, 2026

Attack Chain:

  1. Attacker creates GitHub issue with crafted title containing prompt injection
  2. AI triage bot (claude-code-action) processes malicious title
  3. Bot runs npm install from attacker-controlled commit via dangling commit technique
  4. Malicious preinstall script deploys Cacheract for Actions cache poisoning
  5. Cache poisoning targets nightly release workflow
  6. Attacker exfiltrates VSCE_PAT, OVSX_PAT, NPM_RELEASE_TOKEN
  7. Malicious [email protected] published to npm

TTPs

TacticTechniqueObservable
Initial AccessT1195.002 - Supply Chain CompromiseMalicious npm package pushed
ExecutionT1059.001 - PowerShellpostinstall script installs OpenClaw
PersistenceT1546 - Event Triggered Executionnpm lifecycle scripts
Defense EvasionT1574.001 - Hijack Execution FlowGitHub Actions cache poisoning
Credential AccessT1552.001 - Credentials in FilesExfiltration of npm tokens, VS Code PATs

Detection Opportunities

# Detect unexpected global npm installs
process_name="npm" AND command_line="*install*-g*openclaw*"

# GitHub Actions cache anomalies (Cacheract signature)
github_actions_step="actions/checkout" AND step_output="" AND exit_code != 0

# npm postinstall script execution
process_parent_name="npm*" AND script_name="postinstall"

# Suspicious AI agent process spawning shell commands
process_grandparent_name MATCHES "(claude|anthropic|ai-bot)" AND process_name IN ("bash", "sh", "cmd.exe")

Log Sources

  • npm audit logs
  • GitHub Actions workflow logs
  • CI/CD pipeline telemetry
  • Package manager install logs

Detection Coverage

SourceStatus
Sigma❌ Gap — No AI agent exploitation rules
Splunk ESCU❌ Gap — Limited CI/CD supply chain coverage
Elastic❌ Gap — No prompt injection detection

Recommendation: If you installed [email protected] via npm, uninstall it and OpenClaw immediately. Rotate any credentials accessible from affected machines.

Sources


4. Remcos RAT — Real-Time Surveillance Capabilities Added

What’s New

New Remcos RAT variant adds real-time webcam streaming and live keylogging, shifting from local data storage to direct C2 transmission for reduced forensic footprint.

Technical Details

FieldValue
Malware FamilyRemcos RAT
VariantNew (Feb 2026)
Target OSWindows
C2 ProtocolEncrypted HTTP/TCP
MutexRmc-GSEGIF

New Capabilities:

  • Live webcam streaming via downloaded DLL module (not embedded)
  • Online keylogging with real-time C2 transmission
  • Encrypted C2 config decrypted only in memory
  • Dynamic API resolution to evade static analysis
  • Cleanup routines removing logs, browser data, registry persistence
  • VBS script self-deletion mechanism

TTPs

TacticTechniqueObservable
ExecutionT1059.005 - Visual BasicTemp VBS scripts for self-deletion
PersistenceT1547.001 - Registry Run KeysModified registry entries
Defense EvasionT1027 - Obfuscated FilesEncrypted C2 config, dynamic API loading
CollectionT1056.001 - KeyloggingReal-time keystroke capture
CollectionT1125 - Video CaptureLive webcam streaming via DLL module
C2T1573.001 - Encrypted ChannelEncrypted HTTP/TCP communications
ExfiltrationT1041 - Exfil Over C2Real-time data transmission

Detection Opportunities

# Remcos mutex detection
create_mutex_name="Rmc-GSEGIF"

# Webcam DLL module loading at runtime
process_name="*" AND loaded_dll MATCHES ".*cam.*\.dll" AND dll_load_type="dynamic"

# VBS self-deletion script in TEMP
file_path="%TEMP%\\*.vbs" AND file_content MATCHES "(WScript\.Shell|DeleteFile)"

# PowerShell Windows Defender exclusion (common Remcos technique)
process_name="powershell*" AND command_line="*Add-MpPreference*" AND command_line="*ExclusionPath*"

# Suspicious outbound connections from process with webcam access
process_has_camera_access=true AND network_direction="outbound" AND dest_port NOT IN (443, 80)

Log Sources

  • Sysmon Event ID 1, 7 (Process/DLL), 3 (Network)
  • Windows Defender logs
  • EDR telemetry with API monitoring
  • USB/Camera access logs

Detection Coverage

SourceStatus
Sigma❌ Gap — No Remcos-specific rules
Splunk ESCU✅ Defender exclusion detection, suspicious DNS queries
Elastic⚠️ Partial — Generic RAT behaviors

Recommendation: Monitor for processes dynamically loading webcam-related DLLs and making encrypted outbound connections.

Sources


5. ClearFake & PS1Bot — Red Canary Intelligence Insights

What’s New

Red Canary’s February 2026 Intelligence Insights highlights ClearFake (fake CAPTCHA paste-and-run) and PS1Bot (modular PowerShell stealer) as top threats, with new detection opportunities.

Technical Details

FieldValue
ThreatsClearFake, PS1Bot, ScreenConnect (malicious use), NetSupport Manager
DistributionCompromised WordPress sites, SEO poisoning, malvertising
PayloadsAmadey, ArechClientC2, LummaC2, Rhadamanthys

ClearFake Evolution:

  • Now using fake CAPTCHA paste-and-run lures
  • Recent execution via SyncAppvPublishingServer.vbs (LOLBIN)
  • PowerShell with invoke-restmethod to attacker IPs

PS1Bot Modules:

  • Keylogger
  • Screen capture
  • Info stealer (passwords, crypto seeds, MFA app data)
  • Delivered via SEO poisoning (ZIP files with malicious JS)

TTPs

TacticTechniqueObservable
Initial AccessT1189 - Drive-by CompromiseCompromised WordPress sites
ExecutionT1204.004 - User Execution: Copy PasteFake CAPTCHA paste-and-run
ExecutionT1059.001 - PowerShellirm/iex to remote IP
Defense EvasionT1218.011 - Signed Script ProxySyncAppvPublishingServer.vbs abuse
CollectionT1056.001 - KeyloggingPS1Bot keylogger module
Credential AccessT1555 - Credentials from Password StoresBrowser credential theft

Detection Opportunities

# ClearFake PowerShell download (Red Canary detection)
process_name="powershell" 
  AND deobfuscated_command MATCHES "(irm|invoke-restmethod)" 
  AND deobfuscated_command MATCHES "(iex|invoke-expression)"
  AND deobfuscated_command MATCHES "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}"

# SyncAppvPublishingServer.vbs abuse
process_name="wscript.exe" 
  AND command_line="*SyncAppvPublishingServer.vbs*"
  AND command_line MATCHES "(cdn\.jsdelivr|gal i\*x)"

# PS1Bot initial execution (wscript running JS from ZIP)
process_name="wscript.exe" 
  AND command_line="*FULL DOCUMENT.js*"

# PS1Bot random ProgramData directory
file_path MATCHES "C:\\ProgramData\\[a-zA-Z]{2,8}\\.*\.ps1"

Log Sources

  • Sysmon Event ID 1 (Process Creation)
  • PowerShell ScriptBlock logging (Event ID 4104)
  • DNS query logs
  • Web proxy logs

Detection Coverage

SourceStatus
Sigma⚠️ Partial — Generic PowerShell download rules
Splunk ESCU✅ PowerShell suspicious commands
Elastic⚠️ Partial — LOLBIN abuse detection

Sources


6. Cisco State of AI Security 2026 — MCP Agent Risks

What’s New

Cisco released the State of AI Security 2026 report highlighting Model Context Protocol (MCP) agentic AI as a growing risk surface, with open-source scanners for MCP, A2A, and agentic skill files released.

Key Findings

  • 83% of organizations planned to deploy agentic AI, but only 29% felt security-ready
  • MCP agents can be weaponized by adversaries for automated attack campaigns
  • AI supply chain (datasets, models, tools) increasingly fragile
  • Open-weight models remain susceptible to jailbreaks and prompt injection

Detection Relevance

Organizations deploying AI agents should:

  • Monitor for suspicious MCP server connections
  • Audit AI agent skill/tool permissions
  • Implement prompt injection detection at ingestion points
  • Log all AI agent tool invocations

Sources


Priority Actions

  1. BeyondTrust: Hunt for PHP web shells with eval() patterns, DNS tunneling to OAST domains, SparkRAT user-agent strings
  2. VS Code Extensions: Disable Live Server when not in use; audit extension network connections
  3. CI/CD Security: Review AI agent permissions in GitHub Actions; implement cache isolation
  4. Remcos: Alert on dynamic webcam DLL loading + encrypted outbound connections
  5. ClearFake/PS1Bot: Detect PowerShell irm/iex to raw IP addresses; monitor for SyncAppvPublishingServer.vbs abuse

Generated: February 20, 2026 05:00 PST