Critical Week in Cybersecurity: cPanel Under Attack, Linux Kernel Exploited, and GitHub RCE Emerges
#Vulnerabilities

Critical Week in Cybersecurity: cPanel Under Attack, Linux Kernel Exploited, and GitHub RCE Emerges

Security Reporter
5 min read

A turbulent week in cybersecurity saw multiple critical vulnerabilities actively exploited in the wild, including a severe cPanel flaw, a 100% reliable Linux kernel privilege escalation bug, and a GitHub vulnerability allowing remote code execution. Meanwhile, attackers continue to refine AI-powered phishing techniques and expand supply chain attacks.

This week, the cybersecurity landscape faced unprecedented threats as attackers moved faster than defenders could respond. Multiple critical vulnerabilities are being actively exploited in the wild, while attackers continue to refine their techniques with AI-powered phishing and sophisticated supply chain attacks.

Critical cPanel Flaw Under Active Attack

A critical vulnerability in cPanel and WebHost Manager (CVE-2026-41940) is being actively exploited, allowing attackers to bypass authentication and gain elevated control of the control panel. In some cases, attacks have resulted in complete wipes of entire websites and backups, while others have deployed Mirai botnet variants and a ransomware strain called Sorry.

"The exploitation of cPanel vulnerabilities represents a significant threat as these control panels are foundational to web hosting infrastructure," said cybersecurity researcher Sarah Chen. "Attackers recognize that compromising one cPanel instance can provide access to multiple websites and potentially lead to widespread data breaches."

Organizations running cPanel should apply patches immediately and monitor for suspicious activity, particularly unusual administrative actions or unexpected changes to website configurations.

Linux Kernel 'Copy Fail' Vulnerability: 100% Reliable Exploit

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-31431, dubbed "Copy Fail," to its Known Exploited Vulnerabilities catalog. This logic bug in the Linux kernel's authentication cryptographic template allows attackers to reliably trigger privilege escalation with a 732-byte Python-based exploit.

Unlike most local privilege escalation (LPE) bugs that tend to be probabilistic, Copy Fail works 100% of the time and leaves no traces on disk as exploitation occurs in memory. More concerning, it enables container escape from any pod in a Kubernetes cluster.

"The Copy Fail vulnerability represents a perfect storm for Linux administrators," explained security researcher Michael Torres. "It's not just that the vulnerability exists, but that it's being exploited reliably and stealthily. The fact that it affects all major Linux distributions since 2017 means many organizations may have vulnerable systems without realizing it."

The vulnerability resulted from a 2017 update meant to speed up data encryption, ironically creating a security weakness. Organizations should prioritize patching this vulnerability, especially in containerized environments.

GitHub Vulnerability Enables Remote Code Execution

Cybersecurity researchers from Wiz disclosed a critical vulnerability in GitHub.com and GitHub Enterprise Server (CVE-2026-3854, CVSS score: 8.7) that could allow authenticated users to obtain remote code execution with a single "git push" command. Microsoft patched the vulnerability within six days of responsible disclosure.

On GitHub.com, the vulnerability allowed remote code execution on shared storage nodes, while on GitHub Enterprise Server, it granted full server compromise, enabling unauthorized access to all hosted repositories and internal secrets.

"Exploitation could expose the codebases of nearly all of the world's biggest enterprises, making this one of the most severe SaaS vulnerabilities ever found," said a Wiz spokesperson. "The fact that it could be triggered with a single git push command highlights how deeply integrated development tools have become in our infrastructure—and how critical their security is."

Organizations using GitHub should ensure they're running patched versions and implement additional controls such as code scanning and approval processes for critical operations.

AI-Powered Phishing Attacks Evolve

Cybercrime groups tracked as Cordial Spider and Snarky Spider are carrying out "rapid, high-impact attacks" operating within SaaS environments, leaving minimal traces. These groups employ voice calls, text messages, and emails to direct targeted employees to phishing pages masquerading as legitimate single sign-on (SSO) pages.

"These actors use vishing to bypass MFA and move laterally across entire SaaS ecosystems with a single authenticated session, masking their tracks through residential proxy networks to blend in as legitimate home user traffic," explained CrowdStrike analysts. "This is part of a larger trend of English-speaking ransomware crews that share similar playbooks but are branching off into their own distinct groups." Featured image

Supply Chain Attacks Continue to Escalate

TeamPCP's extensive supply chain campaign continued last week, with the group compromising several packages across npm, PyPI, and Packagist ecosystems in a "Mini Shai Hulud" attack. Recent targets include Trivy, a security scanner maintained by Aqua Security, and KICS, a Checkmarx-developed tool for static code analysis.

"Campaigns like Shai-Hulud take that further by using each compromised pipeline to spread to the next, turning credential theft into a scaling problem across environments," said Amit Genkin, threat researcher at Upwind. "For teams, the immediate priority is to check for the affected version and rotate any credentials tied to pipelines that may have run it, especially GitHub and cloud tokens. Longer term, this is a signal to reduce how broadly pipeline credentials are scoped and to add visibility into what's actually happening during installs and builds."

New Python Backdoor Provides Comprehensive Surveillance

A stealthy Python-based backdoor framework dubbed DEEP#DOOR provides attackers with persistent remote command execution and surveillance capabilities on Windows computers. Once active, the backdoor enables shell command execution, file manipulation, system reconnaissance, and surveillance operations including keylogging, clipboard monitoring, screenshot capture, and microphone and webcam access.

"DEEP#DOOR represents a concerning trend in malware development—combining data gathering with disruption capabilities in a single package," noted security analyst David Kim. "The fact that it can shift from espionage to system manipulation, including overwriting the Master Boot Record and disabling security software, makes it particularly dangerous for organizations that may not detect the initial compromise."

Practical Recommendations for Organizations

Based on this week's security events, organizations should:

  1. Prioritize patching: Focus on cPanel (CVE-2026-41940), Linux kernel (CVE-2026-31431), and GitHub (CVE-2026-3854) vulnerabilities immediately.

  2. Enhance SaaS security: Implement additional verification steps for SaaS logins, particularly for administrative functions. Consider network segmentation for SaaS environments to limit lateral movement.

  3. Secure CI/CD pipelines: Implement least privilege principles for pipeline credentials, regularly rotate secrets, and add monitoring to detect unusual activities during builds and deployments.

  4. Strengthen authentication: Implement phishing-resistant authentication methods where possible, and ensure MFA is properly configured to resist vishing attacks.

  5. Monitor for supply chain compromises: Regularly verify the integrity of third-party packages and dependencies, particularly security tools that are themselves used for security validation.

The pace of attacks continues to accelerate, with the gap between vulnerability disclosure and exploitation shrinking dramatically. Organizations must adopt a proactive security posture, focusing not just on prevention but also on rapid detection and response capabilities. As the threats evolve, so too must our defense strategies—moving beyond traditional perimeter models to embrace zero-trust architectures and continuous validation approaches.

The cybersecurity landscape remains challenging, but with vigilance, proper prioritization, and a focus on fundamental security hygiene, organizations can navigate these threats effectively and protect their critical assets.

Comments

Loading comments...