Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The year of AI-assisted attacks

Critical cPanel vulnerability exploited to target government and MSP networks

Zscaler ThreatLabz 2026 VPN Risk Report

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Critical cPanel vulnerability exploited to target government and MSP networks
Identity

Critical cPanel vulnerability exploited to target government and MSP networks

By May 4, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 4, 2026Vulnerability/Network Security

A previously unknown attacker was observed exploiting a recently disclosed cPanel vulnerability to target small clusters of managed service providers (MSPs) and hosting providers in the Philippines, Laos, Canada, South Africa, and the United States, as well as government and military organizations in Southeast Asia.

This activity, detected by Ctrl-Alt-Intel on May 2, 2026, involves exploitation of CVE-2026-41940, a critical vulnerability in cPanel and WebHost Manager (WHM) that could lead to authentication bypass and allow a remote attacker to gain advanced control of the control panel.

The attack took place from the IP address 95.111.250.[.]175” uses a publicly available proof of concept (PoC) to identify government and military domains, as well as MSPs and hosting providers, primarily related to the Philippines (*.mil.ph and (*.ph)) and Laos (*.gov.la).

Additionally, Ctrl-Alt-Intel revealed that prior to the cPanel attack, the attackers used another custom exploit chain against an Indonesian defense sector training portal using a combination of authenticated SQL injection and remote code execution. In this case, the attacker is said to already have valid credentials for the portal in question.

Ctrl-Alt-Intel said, “The script uses hard-coded credentials and disables the portal’s CAPTCHA by reading the expected CAPTCHA value from the server-issued session cookie, rather than resolving the challenge as usual.”

“Once authenticated and passing the CAPTCHA, the attacker moves to the document management functionality. The vulnerable parameter is the field used to store the document name, and the script injects SQL into that field when posting to the document storage endpoint.”

Further analysis revealed that the attackers were using the AdapdixC2 command and control (C2) framework to remotely take over compromised endpoints. Tools such as OpenVPN and Ligolo are also used to facilitate persistent access to the victim’s internal network.

“The attackers used OpenVPN, Ligolo, and systemd Persistence to build a durable access layer and used that access to infiltrate internal networks and exfiltrate a substantial corpus of documents from China’s railway sector,” Ctrl-Alt-Intel added.

While it is currently unclear who is behind this campaign, the development comes after Censys announced that it had found evidence suggesting the cPanel vulnerability was being weaponized by multiple third parties within 24 hours of its disclosure, including a variant of the Mirai botnet and the introduction of a ransomware strain called Sorry.

At least 44,000 IP addresses potentially compromised by CVE-2026-41940 are said to have conducted scans and brute force attacks against honeypots on April 30, 2026, according to data from the Shadowserver Foundation. As of May 3, that number had dropped to 3,540.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleZscaler ThreatLabz 2026 VPN Risk Report
Next Article The year of AI-assisted attacks

Related Posts

The year of AI-assisted attacks

May 4, 2026

Zscaler ThreatLabz 2026 VPN Risk Report

May 4, 2026

Global crackdown arrests 276 people, shuts down 9 crypto fraud centers and seizes $701 million

May 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The year of AI-assisted attacks

Critical cPanel vulnerability exploited to target government and MSP networks

Zscaler ThreatLabz 2026 VPN Risk Report

Global crackdown arrests 276 people, shuts down 9 crypto fraud centers and seizes $701 million

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.