LIVE NEWS
  • Cockroach Janta Party’s founder says Indian government took website down | Politics News
  • Bitcoin tanks to $74,300 as spot ETFs bleed $2.26 billion in two weeks
  • $20 per zero-day is already the WordPress plugin reality
  • Three signs from APEC that the U.S., China remain far apart on trade
  • Washington’s latest force posture moves have Europeans feeling whiplash
  • Concert ticket prices are reshaping summer live music demand
  • Bookshelf: 2026 looks awfully like 1914
  • Levoit Sprout Evaporative Humidifier review: A child-safe solution to dry air
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Critrical cPanel flaw mass-exploited in “Sorry” ransomware attacks
Cybersecurity

Critrical cPanel flaw mass-exploited in “Sorry” ransomware attacks

primereportsBy primereportsMay 3, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Critrical cPanel flaw mass-exploited in “Sorry” ransomware attacks
Share
Facebook Twitter LinkedIn Pinterest Email


Critrical cPanel flaw mass-exploited in “Sorry” ransomware attacks

A new disclosed cPanel flaw tracked as CVE-2026-41940 is being mass-exploited to breach websites and encrypt data in “Sorry” ransomware attacks.

This week, an emergency update for WHM and cPanel was released to fix a critical authentication bypass flaw that allows attackers to access control panels.

WHM and cPanel are Linux-based web hosting control panels for server and website management. While WHM provides server-level control, cPanel provides administrator access to the website backend, webmail, and databases.

Soon after its release, it was reported that the flaw was being actively exploited in the wild as a zero-day, with exploitation attempts dating back to late February.

Internet security watchdog Shadowserver now reports that at least 44,000 IP addresses running cPanel have since been compromised in ongoing attacks.

cPanel flaw exploited for Sorry ransomware attacks

Numerous sources told BleepingComputer that hackers have been exploiting the cPanel flaw since Thursday to breach servers and deploy a Go-based Linux encryptor for the “Sorry” ransomware [VirusTotal].

There have been numerous reports of websites impacted by the attacks, including on the BleepingComputer forums, where a victim shared samples of the encrypted files and the contents of the ransom note.

Since then, widespread exploitation and ransomware attacks have been spotted, with hundreds of compromised sites already indexed in Google.

Google listing of websites hit in Sorry ransomware attacks
Google listing of websites hit in Sorry ransomware attacks
Source: BleepingComputer

The Sorry ransomware encryptor is designed specifically for Linux and will append the “.sorry” extension to all encrypted files.

Files encrypted by the Sorry ransomware
Files encrypted by the Sorry ransomware
Source: diozada on the BleepingComputer forums

BleepingComputer was told that the ransomware uses the ChaCha20 stream cipher to encrypt files, with the encryption key protected using an embedded RSA-2048 public key.

Ransomware expert Rivitna says the only way to decrypt these files is to obtain the corresponding private RSA-2048 key.

“Decryption is impossible without an RSA-2048 private key,” Rivitna posted to our forums.

In each folder, a ransom note named README.md is created, instructing the victim to contact the threat actor on Tox to negotiate a ransom payment.

The ransom note is the same for each victim of this ransomware campaign, including the Tox ID “3D7889AEC00F2325E1A3FBC0ACA4E521670497F11E47FDE13EADE8FED3144B5EB56D6B198724,” which is used to contact the threat actor.

Sorry ransomware ransom note
Sorry ransomware ransom note
Source: BleepingComputer

It should be noted that a 2018 ransomware campaign utilized a HiddenTear encryptor to encrypt files and append the .sorry extension. This current campaign uses a different encryptor and is unrelated.

All cPanel and WHM users are urged to immediately install the available security updates to protect their websites from ransomware attacks and data theft.

The attacks have just started, and we will likely see increased exploitation over the coming days and weeks.


article image

AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

Claim Your Spot



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleBonds have more pressing issue than Jamie Dimon credit crisis warning
Next Article Iran Crypto Exchange Nobitex Tied to Kharrazi Family, Reuters Finds
primereports
  • Website

Related Posts

Cybersecurity

$20 per zero-day is already the WordPress plugin reality

May 23, 2026
Cybersecurity

FBI warns about fast-growing phishing kit targeting Microsoft 365 users

May 22, 2026
Cybersecurity

Fake Gemini and Claude Code Sites Spread Infostealers

May 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20265 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Cockroach Janta Party’s founder says Indian government took website down | Politics News
  • Bitcoin tanks to $74,300 as spot ETFs bleed $2.26 billion in two weeks
  • $20 per zero-day is already the WordPress plugin reality
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.