Published May 13th, 2026 // By: DigitalMint Cyber
Sorry Ransomware and the Critical cPanel Vulnerability: What Organizations Need to Know
DigitalMint Cyber original blog post
Sorry ransomware
Cybersecurity News
Cyber Resilience

Recent reporting, including coverage from BleepingComputer, has highlighted a surge in attacks tied to “Sorry ransomware” following the exploitation of a critical cPanel and WHM vulnerability (CVE-2026-41940). While the ransomware itself is not new, the way it is being deployed has made it a serious risk for organizations running exposed cPanel environments.
Sorry ransomware has historically been considered a low-tier or commodity strain, often reused or modified from publicly available code. On its own, it does not stand out among more sophisticated ransomware families. What has changed is its delivery method. Attackers are exploiting a vulnerability that allows authentication bypass in cPanel, giving them direct administrative access to servers without valid credentials. Once inside, they can execute commands, deploy payloads, and encrypt data across websites and backend systems.
This campaign is notable because it shifts the focus away from the ransomware itself and toward the vulnerability enabling access. cPanel is widely used across shared hosting environments, managed service providers, and enterprise web infrastructure, which means a single flaw can expose a large number of systems at once. In the cases observed so far, attackers are scanning for vulnerable instances, gaining access quickly, and deploying ransomware with little delay. The speed between initial access and encryption leaves limited time for detection or response.
DigitalMint has responded to multiple incidents associated with this activity. In those cases, in order to decrypt, it was a 2 step process with the threat actor. This unfortunately opened up the opportunity for re-extortion events. Another red-flag we warned regarding potential re-extortion was the relatively low demand made by this threat actor. From our Threat Actor Negotiation Team:
“This TA reminds us of classic lone wolf TA’s using the Phobos or Dharma ransomware packets. Low demands, communication over email, and having to pay twice.”






































