Live Chat Software by Kayako |
|
May 2 |
cPanel Security Incident – Recovery Progress & Live Updates
Posted by Sufya F on 02 May 2026 08:54 AM |
|
cPanel Security Incident – Live Updates Recovery progress continues. Approximately 40% of affected servers have been fully restored, and 80% of USA reseller servers are now online. Websites and email are operational on restored servers, except cPanel/webmail, which remains disabled for security reasons. [Update 5 – 02 May 2026 | 10:30 AM]
[Update 4 – 02 May 2026 | 08:00 AM] [Update 3 – 01 May 2026 | 11:30 PM]
[Update 2 – 01 May 2026 | 06:00 PM]
[Update 1 – 01 May 2026 | 03:30 PM]
Latest Information & Details Full advisory and updates: https://skynethelp.com/index.php?/News/NewsItem/View/493/critical-security-advisory-temporary-shutdown-of-cpanel-based-services SkyNet blog article: https://skynethosting.net/blog/cpanel-hack-cve-2026-41940/ Technical analysis (WatchTowr): https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940 Community discussion: https://www.reddit.com/r/cpanel/comments/1syyajp/massive_cpanel_0day_auth_bypass_hits_web_hosting Note: Updates will be posted here as progress continues. Read more » | |
|
May 2 |
Update: cPanel Security Incident – Recovery Progress
Posted by Sufya F on 02 May 2026 08:08 AM |
|
Update: cPanel Security Incident – Recovery Progress We would like to provide an important update regarding the ongoing cPanel/WHM security incident (CVE-2026-41940)
As of now:
All restored systems have been:
Due to the severity of the incident, we are not publishing specific server names publicly as part of our security policy. Why Recovery is Taking Time This vulnerability is classified as critical (CVSS 9.8) and allows attackers to bypass authentication and gain administrative access without credentials. Security researchers have confirmed:
Given the scale and risk, each server must go through a complete security validation process before being brought back online. Our Recovery Approach We are following a strict, security-first recovery process:
This ensures that restored services are stable, secure, and not vulnerable to re-exploitation What This Means for Clients
Further Reading & Transparency For full details on this incident and technical background, you may refer to:
Next Steps Our teams are continuing to work around the clock to:
Ongoing Updates We will continue to provide progress updates here: We sincerely appreciate your continued patience and understanding as we work through this incident with the highest priority on security and service reliability.
SkyNetHosting.Net Inc. Security & Infrastructure Team Read more » | |
|
May 1 |
Critical Security Advisory: Temporary Shutdown of cPanel-Based Services
Posted by Daniel Johnson on 01 May 2026 07:58 PM |
|
Executive Summary
Incident Overview A recently disclosed vulnerability in cPanel/WHM (CVE-2026-41940) has been classified as critical, with confirmed reports of active exploitation in the wild. The vulnerability enables:
Industry-wide assessments indicate that over 1.5 million cPanel servers may be exposed globally. Given that each server can host hundreds to thousands of websites, the potential impact extends to Hundreds of millions of websites worldwide. This is a systemic software-level vulnerability, affecting hosting providers globally, irrespective of size or internal security standards.
Industry Context This vulnerability has been widely reported and analyzed by leading cybersecurity firms and global security media, highlighting the severity and urgency of the situation.
Key findings from these reports include:
Given the widespread adoption of cPanel, this is considered one of the most impactful control panel–level security incidents in recent times. Risk in Shared Hosting Environments In cPanel-based shared hosting architectures, a successful exploit at the control panel layer may allow attackers to:
Given the multi-account nature of shared hosting, a single compromised server can have cascading effects across multiple client environments.
Our Decision: Full Shutdown of cPanel Servers
After internal risk evaluation, we have elected to:
This approach ensures:
While this results in temporary service interruption, it reflects a security-first operating model aligned with best practices for high-severity incidents.
Responsibility & Transparency We want to state this clearly:
At present:
Remediation & Ongoing Actions
Our engineering and security teams are actively engaged in:
Systems will only be brought back online once they meet our internal security clearance standards.
Service Restoration
Service restoration will proceed in a phased and controlled manner once:
Our approach prioritizes long-term system integrity over short-term availability
Strategic Outlook This event reinforces the importance of continuous infrastructure evolution. SkyNetHosting.Net is actively:
Client Commitment
We recognize the impact of this temporary disruption and sincerely appreciate your patience.
Our responsibility extends beyond uptime — it includes ensuring that your systems remain:
Support Channels
For urgent matters, our support teams remain available via:
We appreciate your patience and understanding as we work through this situation with the highest priority on security and system integrity. We will continue to monitor developments closely and provide all updates on this page as new information becomes available.
Update: cPanel Security Incident – Recovery Progress
We would like to provide an important update regarding the ongoing cPanel/WHM security incident (CVE-2026-41940)
As of now:
All restored systems have been:
Due to the severity of the incident, we are not publishing specific server names publicly as part of our security policy. Why Recovery is Taking Time This vulnerability is classified as critical (CVSS 9.8) and allows attackers to bypass authentication and gain administrative access without credentials. Security researchers have confirmed:
Given the scale and risk, each server must go through a complete security validation process before being brought back online. Our Recovery Approach We are following a strict, security-first recovery process:
This ensures that restored services are stable, secure, and not vulnerable to re-exploitation What This Means for Clients
Further Reading & Transparency For full details on this incident and technical background, you may refer to:
Next Steps Our teams are continuing to work around the clock to:
Ongoing Updates We will continue to provide progress updates here: We sincerely appreciate your continued patience and understanding as we work through this incident with the highest priority on security and service reliability.
SkyNetHosting.Net Inc. Security & Infrastructure Team Read more » | |
|
May 1 |
cPanel/WHM Authentication Vulnerability
Posted by Sandra Philip on 01 May 2026 06:58 AM |
|
Hello Everyone, We would like to inform our clients about a recently identified security vulnerability affecting cPanel/WHM authentication systems.
Best regards,
Read more » | |
|
Mar 4 |
Security maintenance due to a reported cPanel vulnerability - All servers
Posted by Aaron J on 04 March 2026 03:46 AM |
|
Hello,
A security vulnerability has been reported in cPanel (CVE-2026-41940). As per the advisory below, we are currently performing security maintenance across all servers:
This is a preventive security measure to ensure all systems are updated and protected. We appreciate your patience during this period. Services will stabilize once the maintenance is completed.
Read more » | |
|
Mar 4 |
Server Upgrade Notification - usvip5.noc401.com
Posted by Aaron J on 04 March 2026 03:42 AM |
|
Hello, We would like to inform you that the server live upgrade has been scheduled for March 03th at 21:00:00 UTC. This upgrade is necessary to enhance the server's performance. Rest assured, there will be no downtime during this process, as it will be a live migration. Your IPs will remain the same after the migration is complete. It will take 48-72 hours for the migration to complete. To ensure a smooth and error-free migration process, we kindly request that you refrain from making any changes to your sites during this time. This includes avoiding upgrades to your CMS or installation of new plugins. We understand that you may be eager to enhance your website, but making changes during the migration process can lead to complications and potential errors. By waiting until the migration is complete, you can ensure a seamless transition without any disruptions to your site's functionality. We will synchronize all emails once the migration is completed. Our team is dedicated to providing you with the best possible service, and we appreciate your cooperation in this matter. If you have any questions or concerns, please don't hesitate to reach out to our support team. Thank you for your understanding and patience.
We understand the importance of keeping you informed, and we will provide regular updates on the migration progress through this news thread. If you have any questions or concerns regarding this upgrade, please do not hesitate to contact our technical support team.
Thank you for your continued trust in our services Read more » | |
