Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    CVE-2026-7685 | THREATINT

    May 3, 2026

    CVE-2026-7686 | THREATINT

    May 3, 2026

    Critrical cPanel flaw mass-exploited in “Sorry” ransomware attacks

    May 3, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Critrical cPanel flaw mass-exploited in “Sorry” ransomware attacks
    News

    Critrical cPanel flaw mass-exploited in “Sorry” ransomware attacks

    adminBy adminMay 3, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    cPanel logo

    A new disclosed cPanel flaw tracked as CVE-2026-41940 is being mass-exploited to breach websites and encrypt data in “Sorry” ransomware attacks.

    This week, an emergency update for WHM and cPanel was released to fix a critical authentication bypass flaw that allows attackers to access control panels.

    WHM and cPanel are Linux-based web hosting control panels for server and website management. While WHM provides server-level control, cPanel provides administrator access to the website backend, webmail, and databases.

    Soon after its release, it was reported that the flaw was being actively exploited in the wild as a zero-day, with exploitation attempts dating back to late February.

    Internet security watchdog Shadowserver now reports that at least 44,000 IP addresses running cPanel have since been compromised in ongoing attacks.

    cPanel flaw exploited for Sorry ransomware attacks

    Numerous sources told BleepingComputer that hackers have been exploiting the cPanel flaw since Thursday to breach servers and deploy a Go-based Linux encryptor for the “Sorry” ransomware [VirusTotal].

    There have been numerous reports of websites impacted by the attacks, including on the BleepingComputer forums, where a victim shared samples of the encrypted files and the contents of the ransom note.

    Since then, widespread exploitation and ransomware attacks have been spotted, with hundreds of compromised sites already indexed in Google.

    Google listing of websites hit in Sorry ransomware attacks
    Google listing of websites hit in Sorry ransomware attacks
    Source: BleepingComputer

    The Sorry ransomware encryptor is designed specifically for Linux and will append the “.sorry” extension to all encrypted files.

    Files encrypted by the Sorry ransomware
    Files encrypted by the Sorry ransomware
    Source: diozada on the BleepingComputer forums

    BleepingComputer was told that the ransomware uses the ChaCha20 stream cipher to encrypt files, with the encryption key protected using an embedded RSA-2048 public key.

    Ransomware expert Rivitna says the only way to decrypt these files is to obtain the corresponding private RSA-2048 key.

    “Decryption is impossible without an RSA-2048 private key,” Rivitna posted to our forums.

    In each folder, a ransom note named README.md is created, instructing the victim to contact the threat actor on Tox to negotiate a ransom payment.

    The ransom note is the same for each victim of this ransomware campaign, including the Tox ID “3D7889AEC00F2325E1A3FBC0ACA4E521670497F11E47FDE13EADE8FED3144B5EB56D6B198724,” which is used to contact the threat actor.

    Sorry ransomware ransom note
    Sorry ransomware ransom note
    Source: BleepingComputer

    It should be noted that a 2018 ransomware campaign utilized a HiddenTear encryptor to encrypt files and append the .sorry extension. This current campaign uses a different encryptor and is unrelated.

    All cPanel and WHM users are urged to immediately install the available security updates to protect their websites from ransomware attacks and data theft.

    The attacks have just started, and we will likely see increased exploitation over the coming days and weeks.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleZDI-26-155: (Pwn2Own) Philips Hue Bridge hap_pair_verify_handler Sub-TLV Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
    Next Article CVE-2026-7686 | THREATINT
    admin
    • Website

    Related Posts

    News

    The Real Danger Lurking in the NVD Backlog | Blog

    May 2, 2026
    News

    VulnCheck Initial Access Intelligence Update – May 2024 | Blog

    May 2, 2026
    News

    What Actually Matters for Cybersecurity Leaders

    May 2, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202671 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    CVE-2026-7685 | THREATINT

    May 3, 2026

    CVE-2026-7686 | THREATINT

    May 3, 2026

    Critrical cPanel flaw mass-exploited in “Sorry” ransomware attacks

    May 3, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.