Weekly review

ThreatNoir Afternoon Brief — May 1

2026-05-01Afternoon4 articles
Audio
Listen to the episode

Afternoon Review in IT Security — May 1, 2026

The cybersecurity landscape continues to face critical threats as the first day of May brings urgent warnings about infrastructure vulnerabilities, supply chain compromises, and insider threats within the security industry itself. Organizations worldwide are grappling with active exploitation of unpatched systems while law enforcement pursues those who have weaponized their security expertise against the public.

Critical cPanel Vulnerability Lets Attackers Bypass Login, Gain Root Access

A critical vulnerability in cPanel has emerged as an immediate threat to server administrators and hosting providers worldwide. The flaw enables attackers to bypass authentication mechanisms entirely and obtain root-level access to affected systems, granting complete control over hosted environments and customer data. Source: Critical cPanel Vulnerability Lets Attackers Bypass Login, Gain Root Access

The vulnerability, tracked as CVE-2026-41940, has already been exploited in active attacks before security patches were made available to the public. This zero-day scenario presents an urgent patching priority for any organization running cPanel infrastructure, as the window between discovery and weaponization has already closed.

1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

A coordinated supply chain attack targeting popular open-source packages has compromised approximately 1,800 organizations across multiple sectors. The attackers successfully injected malicious code into compromised versions of Lightning and Intercom packages, which together accumulate nearly 10 million monthly downloads. Source: 1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom

The campaign, attributed to the Mini Shai-Hulud malware family, demonstrates the continued vulnerability of the open-source ecosystem to supply chain compromise. The infrastructure behind the attack utilized the domain zero.masscan.cloud, and the scope of potential impact extends to SAP environments and numerous other enterprise systems that depend on these widely-used packages.

Two US Security Experts Sentenced to Prison for Helping Ransomware Gang

The Department of Justice has secured convictions against two security professionals who leveraged their expertise to assist ransomware operations. Ryan Goldberg of Georgia and Kevin Martin of Texas were each sentenced to four years in federal prison for their roles in supporting ransomware gangs. Source: Two US Security Experts Sentenced to Prison for Helping Ransomware Gang

The convictions involved assistance provided to operators of the Alphv and BlackCat ransomware families, highlighting a troubling trend of security professionals turning to cybercrime. These cases underscore the law enforcement focus on insider threats and the willingness of prosecutors to pursue lengthy sentences against those who weaponize their technical knowledge.

A Ransomware Negotiator Was Working for a Ransomware Gang

The security industry faced a significant credibility blow when a ransomware negotiator—a professional hired to reduce ransom demands on behalf of victims—pleaded guilty to secretly working for the very criminal organizations he was ostensibly negotiating against. Source: A Ransomware Negotiator Was Working for a Ransomware Gang

This case reveals a sophisticated conflict of interest scheme in which the negotiator could manipulate discussions to benefit the ransomware gang while appearing to act in the victim's interest. The revelation raises questions about the vetting processes used by organizations hiring third-party negotiators and the potential for similar compromises in other critical incident response roles.

Today's threat landscape reflects an escalating sophistication in attack methods, from zero-day infrastructure exploits to deeply embedded insider threats within the security profession itself. Organizations must accelerate patching schedules, implement stricter supply chain verification, and enhance monitoring of third-party relationships to mitigate these converging risks.

Sources & IOCs

Source articles and extracted indicators (defanged where appropriate).

1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom
Malware2
  • Mini Shai-Hulud
    Information-stealing malware delivered via compromised NPM, PyPI, and PHP packages
  • Shai-Hulud
    Parent supply chain attack campaign from late 2025; Mini variant is continuation
Domain1
  • zero.masscan.cloud
    Data exfiltration infrastructure for Mini Shai-Hulud payload