{"id":791,"date":"2026-05-04T10:42:48","date_gmt":"2026-05-04T10:42:48","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=791"},"modified":"2026-05-04T10:42:48","modified_gmt":"2026-05-04T10:42:48","slug":"critical-cpanel-vulnerability-weaponized-to-target-government-and-msp-networks","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=791","title":{"rendered":"Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">May 04, 2026<\/span><\/span><span class=\"p-tags\">Vulnerability \/ Network Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhlgjtQddA9U3D-xf2UWj5GKV2R5tEwjqWWY9fwRQi_fZgG5tf140uw2P4oVfmcvPZcMYuFDo1mvqYKkgKSmgfBxVloaWTrN7vgPiH1FX8ivdh8PFBN9LvfJF13a0ajbXDLEV20pr9d2rSoQo4KWbDYSpSOFJYoPYDHizXQ3tYNGVhhysD8h3FWWpOkHytN\/s1700-e365\/ccc.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>A previously unknown threat actor has been observed targeting government and military entities in Southeast Asia, alongside a smaller cluster of managed service providers (MSPs) and hosting providers in the Philippines, Laos, Canada, South Africa, and the U.S., by exploiting the recently disclosed vulnerability in cPanel.<\/p>\n<p>The activity, <a href=\"https:\/\/ctrlaltintel.com\/research\/SEA-CPanel\/\">detected<\/a> by Ctrl-Alt-Intel on May 2, 2026, involves the abuse of CVE-2026-41940, a critical vulnerability in cPanel and WebHost Manager (WHM) that could result in an authentication bypass and allow remote attackers to gain elevated control of the control panel.<\/p>\n<p>The attack efforts have originated from the IP address \u00ab95.111.250[.]175,\u00bb primarily singling out government and military domains associated with the Philippines (*.mil.ph and (*.ph)) and Laos (*.gov.la), as well as MSPs and hosting providers, using <a href=\"https:\/\/github.com\/watchtowrlabs\/watchTowr-vs-cPanel-WHM-AuthBypass-to-RCE.py\">publicly-available<\/a>\u00a0<a href=\"https:\/\/github.com\/debugactiveprocess\/cPanel-WHM-AuthBypass-Session-Checker\">proof-of-concepts<\/a> (PoCs).<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/threatlabz-vpn-risk-2026-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhnNON5UeWywT7OcPNw7V4L7QNWnCnm7Xl_99Y9ek8dL-gRwx-bWxQM1TKqt8deqqrdpUyKMuuijAWyyPQVB0s0qf8ntQ6ldFAJLru-QUWhddKTopc7SeNbBBnd-TsfFyRPP-AAyDuclLlL6XHK4_LXqDC_7eyaz9pzToYr7U543MhrJ7qcK-89sVWHTQUZ\/s728-e100\/zz-2-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>In addition, Ctrl-Alt-Intel revealed that the threat actor used a separate custom exploit chain for an Indonesian defense sector training portal prior to the cPanel attacks, employing a combination of authenticated SQL injection and remote code execution. In this case, the attacker is said to have already been in possession of valid credentials to the portal in question.<\/p>\n<p>\u00abThe script uses hard-coded credentials and defeats the portal&#8217;s CAPTCHA by reading the expected CAPTCHA value out of the server-issued session cookie rather than solving the challenge normally,\u00bb Ctrl-Alt-Intel said.<\/p>\n<p>\u00abOnce authenticated and passing the CAPTCHA, the actor moves to a document-management function. The vulnerable parameter is the field used to save a document name, and the script injects SQL into that field when posting to the document-save endpoint.\u00bb<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjMQV5OQRjyI-9W7wFgjf7xGFoAQNRlhty4_P3f5_XZdfIJ2K859i-9pg1dssteQdF51hS5VojHMwbEaFwDFq6aC08AC1z97vLSbo7JNlmDBEqi2reruHVgKETyBy3_KRDYmdSFwG_im56qhkMh4HcDjdfhSNPWeXRqXy_mxFObzU-_ner-T92RSDQpdBLk\/s1700-e365\/Exfiltration.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjMQV5OQRjyI-9W7wFgjf7xGFoAQNRlhty4_P3f5_XZdfIJ2K859i-9pg1dssteQdF51hS5VojHMwbEaFwDFq6aC08AC1z97vLSbo7JNlmDBEqi2reruHVgKETyBy3_KRDYmdSFwG_im56qhkMh4HcDjdfhSNPWeXRqXy_mxFObzU-_ner-T92RSDQpdBLk\/s1700-e365\/Exfiltration.png\" alt=\"\" border=\"0\" data-original-height=\"616\" data-original-width=\"881\"\/><\/a><\/div>\n<p>Further analysis has determined that the threat actor is using the AdapdixC2 command-and-control (C2) framework to remotely commandeer the compromised endpoint. Also used are tools like OpenVPN and Ligolo to facilitate persistent access to internal victim networks.<\/p>\n<p>\u00abThe actor built a durable access layer using OpenVPN, Ligolo, systemd persistence, and then used that access to pivot into an internal network and exfiltrate a substantial corpus of Chinese railway-sector documents,\u00bb Ctrl-Alt-Intel added.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/ai-cant-stop-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjPEV6-530TOlxG6PjrmdlY623wpBwduZ7t1HV6flcmO5R4q4AmfixDUzW0CrhlvMVNWbhvOIso-UDNTka4W_W9Chrdj_dglwBZwi7DuePM2IMIl-hfUYVIqBXgfpr_2619K8Gptb4LzwJ6gUbi7lWl2M8AFQJsHEaw63Q7tZ6708YGruiHrr0Y2W9YYxLQ\/s728-e100\/ThreatLocker-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>It&#8217;s currently not known who is behind the campaign, but the development comes as Censys said it <a href=\"https:\/\/censys.com\/blog\/the-cpanel-situation-is\/\">uncovered<\/a> evidence suggesting the cPanel vulnerability is being weaponized by multiple third-parties within 24 hours of public disclosure, including deploying Mirai botnet variants and a ransomware strain called Sorry.<\/p>\n<p>Per data from the Shadowserver Foundation, at least 44,000 IP addresses likely compromised via CVE-2026-41940 are said to have <a href=\"https:\/\/x.com\/Shadowserver\/status\/2050208472386396568\">engaged<\/a> in scanning and brute-force attacks against its honeypots on April 30, 2026. As of May 3, the figure has <a href=\"https:\/\/dashboard.shadowserver.org\/statistics\/honeypot\/device\/time-series\/?date_range=7&amp;vendor=cpanel&amp;dataset=unique_ips&amp;limit=100&amp;group_by=vendor&amp;stacking=stacked&amp;auto_update=on\">dropped<\/a> to 3,540.\u00a0<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802May 04, 2026Vulnerability \/ Network Security A previously unknown threat actor has been observed targeting government and military entities in Southeast Asia, alongside a smaller cluster of managed service&hellip;<\/p>\n","protected":false},"author":1,"featured_media":792,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1465,58,385,486,280,492,68,1509],"class_list":["post-791","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cpanel","tag-critical","tag-government","tag-msp","tag-networks","tag-target","tag-vulnerability","tag-weaponized"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=791"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/791\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/792"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}