A threat actor known as #LongNight is allegedly selling remote code execution (RCE) access to Burger King Spain’s backup infrastructure for $4,000. The vulnerability targets the company’s AhsayCBS system—used to manage backups across local storage, FTP/SFTP, and cloud platforms like AWS and Azure.
Scope of Risk
Security analysts from KrakenLabs warn that the breach could expose up to 2.6 terabytes of sensitive corporate data. The exploit reportedly allows arbitrary code execution at the start and end of backup operations—moments when systems typically run with elevated privileges and reduced monitoring.
Enterprise-Level Exploitation
The attack vector demonstrates a deep understanding of enterprise backup workflows. By exploiting backup execution phases, the threat actor could access real-time data streams, alter backup integrity, or implant persistent backdoors with minimal detection.