Live Chat Software by Kayako |
|
May 16 |
Server Upgrade : MASTER Reseller Server : usm1.noc41.com
Posted by Aaron J on 16 May 2026 07:13 PM |
|
Hello, Greetings!! We would like to inform you that the Master Reseller usm1.noc41.com server live upgrade has been scheduled for May 17th at 4:00 UTC. This upgrade is necessary to enhance the server's performance and resolve the reported multiple accessibility issues. Rest assured, there will be no downtime during this process, as it will be a live migration. Your IPs will remain the same after the migration is complete. It will take 48-72 hours for the migration to complete. To ensure a smooth and error-free migration process, we kindly request that you refrain from making any changes to your sites during this time. This includes avoiding upgrades to your CMS or installation of new plugins. To prevent any discrepancy and ensure a smooth migration process, the FTP services on the server will be temporarily restricted during the migration period. We understand that you may be eager to enhance your website, but making changes during the migration process can lead to complications and potential errors. By waiting until the migration is complete, you can ensure a seamless transition without any disruptions to your site's functionality. We will synchronize all emails once the migration is completed. Our team is dedicated to providing you with the best possible service, and we appreciate your cooperation in this matter. If you have any questions or concerns, please don't hesitate to reach out to our support team. Thank you for your understanding and patience. We understand the importance of keeping you informed, and we will provide regular updates on the migration progress through this news thread. If you have any questions or concerns regarding this upgrade, please do not hesitate to contact our technical support team. Thank you for your continued trust in our services. Read more » | |
|
May 14 |
Server Upgrade : Hongkong reseller server : HKVIP1 [completed]
Posted by Daniel Johnson on 14 May 2026 05:16 PM |
|
Hello, We would like to inform you that the recent cPanel/WHM security incident (CVE-2026-41940) has caused corruption to the server operating system, resulting in several system modules not functioning properly. To ensure service stability and security, we will be replacing the OS drive and performing a fresh operating system installation on May 13 at 12:00 PM SGT. Please note the following:
Our team is fully committed to completing this process as quickly and safely as possible while minimizing disruption to your services. We understand the importance of keeping you informed, and we will continue to provide regular updates regarding the migration progress through this news thread. If you have any questions or concerns, please do not hesitate to contact our technical support team. Thank you for your understanding, patience, and continued trust in our services. ======== We are pleased to inform you that the server migration and restoration process has now been completed successfully, and the services are currently accessible. Please note the following important updates regarding DNS configuration:
64.120.114.206 Due to the temporary shortage of IP availability following the migration process, we have currently assigned a single shared IP address for domain resolution on the server. Additional IP addresses will be gradually added and assigned to accounts accordingly. Once the new IP allocations are completed, we will provide further updates and notify you regarding any required DNS changes for your domains. We sincerely appreciate your patience, cooperation, and understanding throughout this process.
Thank you, Skynethosting.net Read more » | |
|
May 13 |
Server Upgrade : Singapore reseller server : sgvip4.noc401.com [completed]
Posted by Matt Roberts on 13 May 2026 08:13 PM |
|
Hello, We would like to inform you that the recent cPanel/WHM security incident (CVE-2026-41940) has caused corruption to the server operating system, resulting in several system modules not functioning properly. To ensure service stability and security, we will be replacing the OS drive and performing a fresh operating system installation on May 13 at 9:00 PM SGT. Please note the following:
Our team is fully committed to completing this process as quickly and safely as possible while minimizing disruption to your services. We understand the importance of keeping you informed, and we will continue to provide regular updates regarding the migration progress through this news thread. If you have any questions or concerns, please do not hesitate to contact our technical support team. Thank you for your understanding, patience, and continued trust in our services. Best Regards,
=========================== Update: Hello,
We would like to inform you that the migration and restoration process for the SGVIP4 server has now been completed successfully, and the services are currently accessible and operational.
Please note that the server IP addresses remain unchanged for SGVIP4, therefore no DNS or A record changes are required from your end.
You may access the server services using the following direct URLs:
WHM Access: https://sgvip4.noc401.com:2087/
cPanel Access: https://sgvip4.noc401.com:2083/
If you encounter any issues accessing your websites, cPanel accounts, or related services, please reach out to us on ticket with the affected domain name(s) so that we can investigate and assist you further. Please also note that we are currently handling a significantly high volume of support requests related to the recent incident. As a result, there may be a delay in our response times. We kindly request your patience and recommend replying only to your latest active ticket regarding the same issue to help us avoid duplicate handling and assist all clients more efficiently. We sincerely appreciate your patience, cooperation, and understanding throughout this process. Thank you, Skynethosting.net Read more » | |
|
May 2 |
Update: CloudLinux Kernel Vulnerability (CVE-2026-31431)
Posted by Sufya F on 02 May 2026 04:34 PM |
|
Update: CloudLinux Kernel Vulnerability (CVE-2026-31431) We would like to inform you of an additional security update relevant to our ongoing remediation efforts. A newly identified vulnerability affecting CloudLinux systems (CVE-2026-31431) has been reported. https://blog.cloudlinux.com/cve-2026-31431-copy-fail-kernel-update As part of our proactive security measures, we are currently applying the required kernel updates across all affected systems alongside the ongoing cPanel security remediation. In addition:
Impact Status There is no confirmed impact within our infrastructure at this time Service Impact Due to these additional security checks, there may be minor delays in the overall restoration timeline Client Action Required
We remain committed to ensuring the highest level of security and will continue to share updates as necessary. SkyNetHosting.Net Inc
Read more » | |
|
May 2 |
cPanel Security Incident – Recovery Progress & Live Updates
Posted by Sufya F on 02 May 2026 08:54 AM |
|
cPanel Security Incident – Live Updates
Recovery is nearly complete, with the majority of systems back online. However, cPanel remains turned off as we are taking a full backup to prevent any vulnerabilities. After the backup process is completed, you will get access to cPanel. Current Progress:
Notes:
[Update 10 – 07 May 2026 | 7:54 AM GMT] Recovery is nearly complete with the majority of systems back online. However, cPanel remains turned off across all servers until cPanel Inc. provides a permanent solution for the critical vulnerability (CVE-2026-41940). Current Progress:
Note: cPanel remains turned OFF on all servers until a permanent solution for the vulnerability is provided by cPanel Inc. [Update 9 – 04 May 2026 | 11:19 AM GMT] The recovery process is nearing completion. We are on track to have the majority of servers fully patched, updated, and back online shortly, with only a few systems that were more significantly impacted requiring additional recovery work. Current Progress:
The recovery process is progressing well. Within the next 24 hours, we expect the majority of servers to be fully patched, updated, and brought back online, with the exception of a limited number of systems that were more deeply affected by the incident and require additional recovery work. Current Progress:
[Update 7 – 03 May 2026 | 4:05 PM GMT] The recovery process is ongoing. 50% of the affected SEO servers have been successfully restored. Additionally, 30% of Baremetal and SmartCloud servers have been fully restored. [Update 6 – 02 May 2026 | 07:37 AM GMT] Recovery progress continues. Approximately 40% of affected servers have been fully restored, and 80% of USA reseller servers are now online. Websites and email are operational on restored servers, except cPanel/webmail, which remains disabled for security reasons. [Update 5 – 02 May 2026 | 08:30 AM GMT]
[Update 4 – 02 May 2026 | 06:00 AM GMT] [Update 3 – 01 May 2026 | 10:30 PM GMT] Initial recovery phase started. Affected systems isolated and security validation process initiated.
[Update 2 – 01 May 2026 | 01:00 PM GMT]
[Update 1 – 01 May 2026 | 12:30 PM GMT]
Latest Information & Details Full advisory and updates: https://skynethelp.com/index.php?/News/NewsItem/View/493/critical-security-advisory-temporary-shutdown-of-cpanel-based-services SkyNet blog article: https://skynethosting.net/blog/cpanel-hack-cve-2026-41940/ Technical analysis (WatchTowr): https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940 Community discussion: https://www.reddit.com/r/cpanel/comments/1syyajp/massive_cpanel_0day_auth_bypass_hits_web_hosting Note: Updates will be posted here as progress continues. Read more » | |
|
May 2 |
Update: cPanel Security Incident – Recovery Progress
Posted by Sufya F on 02 May 2026 08:08 AM |
|
Update: cPanel Security Incident – Recovery Progress We would like to provide an important update regarding the ongoing cPanel/WHM security incident (CVE-2026-41940)
As of now:
All restored systems have been:
Due to the severity of the incident, we are not publishing specific server names publicly as part of our security policy. Why Recovery is Taking Time This vulnerability is classified as critical (CVSS 9.8) and allows attackers to bypass authentication and gain administrative access without credentials. Security researchers have confirmed:
Given the scale and risk, each server must go through a complete security validation process before being brought back online. Our Recovery Approach We are following a strict, security-first recovery process:
This ensures that restored services are stable, secure, and not vulnerable to re-exploitation What This Means for Clients
Further Reading & Transparency For full details on this incident and technical background, you may refer to:
Next Steps Our teams are continuing to work around the clock to:
Ongoing Updates We will continue to provide progress updates here: We sincerely appreciate your continued patience and understanding as we work through this incident with the highest priority on security and service reliability.
SkyNetHosting.Net Inc. Security & Infrastructure Team Read more » | |
