Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical cPanel Vulnerability Exploited by Cybercriminals

Critical cPanel Vulnerability Exploited by Cybercriminals

Posted on May 11, 2026 By CWS

A critical security flaw in cPanel, identified as CVE-2026-41940, is actively being exploited by cybercriminals to introduce a backdoor known as Filemanager. This vulnerability, which affects cPanel and WebHost Manager (WHM), allows unauthorized access, enabling attackers to manipulate the control panel with elevated privileges.

Exploitation Details and Impact

According to QiAnXin XLab, the vulnerability has attracted numerous attackers following its recent disclosure. The exploit leads to significant security breaches, including cryptocurrency mining, ransomware deployment, and the spread of botnets. Researchers have identified over 2,000 source IP addresses globally involved in automated attacks, with major activities traced back to regions such as Germany, the United States, Brazil, and the Netherlands.

Technical Analysis of the Attack

The exploit involves downloading a Go-based infector using shell scripts via wget or curl from a server (“cp.dene.[de[.]com”). This infector installs an SSH public key for persistent access and deploys a PHP web shell to facilitate file operations and execute remote commands. The injected web shell also serves a fake login page to capture credentials, which are then transmitted using ROT13 encryption to an attacker-controlled server (“wrned[.]com”).

Further, the malware collects sensitive information such as bash history, SSH keys, and database credentials, transmitting them to a Telegram group managed by an entity named “0xWR.” The backdoor, delivered via “wpsock[.]com,” supports remote command execution and file management across various operating systems, including Windows, macOS, and Linux.

Long-Term Threat and Historical Context

The threat actor, identified as Mr_Rot13, appears to have been operating covertly for a substantial period. Evidence suggests that domains linked to the attack were registered as early as October 2020, with related malicious software detected on platforms like VirusTotal since April 2022. Despite the extensive duration of activity, security systems have shown low detection rates for the related infrastructure.

This continued exploitation underscores the importance for organizations to apply patches promptly and enhance their security measures. As cyber threats evolve, staying informed about vulnerabilities like CVE-2026-41940 is critical to safeguarding digital assets.

The Hacker News Tags:cPanel, critical flaw, CVE-2026-41940, cyber attack, Cybersecurity, Filemanager backdoor, Ransomware, threat actor, Vulnerability, web security

Post navigation

Previous Post: AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns

Related Posts

Fortinet Updates Fix Major SQL Injection Vulnerability Fortinet Updates Fix Major SQL Injection Vulnerability The Hacker News
Early Cyber Weapon ‘fast16’ Revealed by Researchers Early Cyber Weapon ‘fast16’ Revealed by Researchers The Hacker News
Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 The Hacker News
Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar) Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar) The Hacker News
New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks New ‘Curly COMrades’ APT Using NGEN COM Hijacking in Georgia, Moldova Attacks The Hacker News
Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training
  • AI-Powered Zero-Day Exploit Bypasses 2FA Security
  • fsnotify Go Library Maintainer Changes Spark Security Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical cPanel Vulnerability Exploited by Cybercriminals
  • AI-Powered Zero-Day Exploits Raise Cybersecurity Concerns
  • Frame Security Launches with $50M for AI Cyber Training
  • AI-Powered Zero-Day Exploit Bypasses 2FA Security
  • fsnotify Go Library Maintainer Changes Spark Security Concerns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark