Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

cPanel CVE-2026-41940 Active exploitation to deploy Filemanager backdoor

‘It’s too early to talk about an IPO,’ says Redwood Materials’ incoming CFO

Hackers use AI to develop first known zero-day 2FA bypass for large-scale exploitation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » cPanel CVE-2026-41940 Active exploitation to deploy Filemanager backdoor
Identity

cPanel CVE-2026-41940 Active exploitation to deploy Filemanager backdoor

By May 11, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 11, 2026Vulnerability/Ransomware

A threat actor named Mr_Rot13 is believed to have exploited a recently revealed critical flaw in cPanel to deploy a backdoor codenamed Filemanager into compromised environments.

This attack exploits vulnerability CVE-2026-41940, which affects cPanel and WebHost Manager (WHM), resulting in an authentication bypass that could allow a remote attacker to gain advanced control of the control panel.

According to a new report from QiAnXin XLab, this security flaw has been exploited by many attackers since its disclosure late last month, resulting in malicious behavior such as cryptocurrency mining, ransomware, botnet propagation, and backdoor implantation.

“Surveillance data shows that over 2,000 source IPs worldwide are currently involved in automated attacks and cybercriminal activity targeting this vulnerability,” said XLab researchers. “These IPs are distributed across multiple regions around the world, primarily originating from regions such as Germany, the United States, Brazil, and the Netherlands.”

Further analysis of the ongoing exploit activity revealed that the Go-based infection program was deployed to a remote server (‘cp.dene.[de[.]com”) is designed to drop a PHP web shell that facilitates file upload/download and remote command execution, as well as embedding an SSH public key into a compromised cPanel system for persistent access.

A web shell is then used to inject JavaScript code to serve a customized login page to steal login credentials, which are then siphoned off to an attacker-controlled system encoded using ROT13 ciphers (‘wrned[.]Once the details are submitted, the attack chain culminates in the deployment of a cross-platform backdoor that can infect Windows, macOS, and Linux systems.

The infector also has the ability to collect sensitive information from compromised hosts, including bash history, SSH data, device information, database passwords, and cPanel virtual aliases (also known as varias) to a three-member Telegram group created by a user named “0xWR.”

In the infection sequence analyzed by XLab, the file manager is delivered via a shell script downloaded from ‘wpsock’.[.]com” domain. The backdoor supports file management, remote command execution, and shell functionality.

There are indications that the threat actors behind this operation have been operating quietly in the shadows for years. This assessment is based on the fact that a command and control (C2) domain embedded in the JavaScript code is used in a PHP-based backdoor (“helper.php”) uploaded to the VirusTotal platform in April 2022. This domain was first registered in October 2020.

“For six years from 2020 to date, the detection rate of Mr_Rot13’s related samples and infrastructure across security products remains extremely low,” XLab said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article‘It’s too early to talk about an IPO,’ says Redwood Materials’ incoming CFO

Related Posts

Hackers use AI to develop first known zero-day 2FA bypass for large-scale exploitation

May 11, 2026

Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More

May 11, 2026

Your purple team is not purple – just red and blue in the same room

May 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

cPanel CVE-2026-41940 Active exploitation to deploy Filemanager backdoor

‘It’s too early to talk about an IPO,’ says Redwood Materials’ incoming CFO

Hackers use AI to develop first known zero-day 2FA bypass for large-scale exploitation

There is a shortage of rockets for space data centers. Cowboy Space raised $275 million to build them.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.