Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical cPanel Vulnerability Exploited by Cybercriminals

Critical cPanel Vulnerability Exploited by Cybercriminals

Posted on May 11, 2026 By CWS

A critical security flaw in cPanel, identified as CVE-2026-41940, is actively being exploited by cybercriminals to introduce a backdoor known as Filemanager. This vulnerability, which affects cPanel and WebHost Manager (WHM), allows unauthorized access, enabling attackers to manipulate the control panel with elevated privileges.

Exploitation Details and Impact

According to QiAnXin XLab, the vulnerability has attracted numerous attackers following its recent disclosure. The exploit leads to significant security breaches, including cryptocurrency mining, ransomware deployment, and the spread of botnets. Researchers have identified over 2,000 source IP addresses globally involved in automated attacks, with major activities traced back to regions such as Germany, the United States, Brazil, and the Netherlands.

Technical Analysis of the Attack

The exploit involves downloading a Go-based infector using shell scripts via wget or curl from a server (“cp.dene.[de[.]com”). This infector installs an SSH public key for persistent access and deploys a PHP web shell to facilitate file operations and execute remote commands. The injected web shell also serves a fake login page to capture credentials, which are then transmitted using ROT13 encryption to an attacker-controlled server (“wrned[.]com”).

Further, the malware collects sensitive information such as bash history, SSH keys, and database credentials, transmitting them to a Telegram group managed by an entity named “0xWR.” The backdoor, delivered via “wpsock[.]com,” supports remote command execution and file management across various operating systems, including Windows, macOS, and Linux.

Long-Term Threat and Historical Context

The threat actor, identified as Mr_Rot13, appears to have been operating covertly for a substantial period. Evidence suggests that domains linked to the attack were registered as early as October 2020, with related malicious software detected on platforms like VirusTotal since April 2022. Despite the extensive duration of activity, security systems have shown low detection rates for the related infrastructure.

This continued exploitation underscores the importance for organizations to apply patches promptly and enhance their security measures. As cyber threats evolve, staying informed about vulnerabilities like CVE-2026-41940 is critical to safeguarding digital assets.

The Hacker News Tags:cPanel, critical flaw, CVE-2026-41940, cyber attack, Cybersecurity, Filemanager backdoor, Ransomware, threat actor, Vulnerability, web security

Post navigation

Previous Post: AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
Next Post: Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading

Related Posts

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group The Hacker News
A 24-Hour Timeline of a Modern Stealer Campaign A 24-Hour Timeline of a Modern Stealer Campaign The Hacker News
CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks The Hacker News
Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data The Hacker News
Oracle Resolves Critical RCE Vulnerability in Identity Manager Oracle Resolves Critical RCE Vulnerability in Identity Manager The Hacker News
Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark