- Critical authentication bypass vulnerability in cPanel/WHM allowing root access via CRLF injection
ThreatNoir Weekend Brief — May 2
Afternoon Review in IT Security — May 2, 2026
The cybersecurity landscape continues to face mounting pressures from sophisticated threat actors exploiting cloud infrastructure vulnerabilities and supply chain weaknesses. Today's threat intelligence reveals coordinated attacks across SaaS environments, critical infrastructure vulnerabilities, and legal consequences for insider threats that underscore the evolving nature of cyber risk.
Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
Cybersecurity researchers have identified two highly organized cybercrime groups conducting rapid, high-impact attacks that operate almost entirely within SaaS environments while leaving minimal forensic traces. The threat clusters, known as Cordial Spider and Snarky Spider, have been linked to numerous aliases including BlackFile, CL-CRI-1116, O-UNC-045, UNC6671, O-UNC-025, and UNC6661. These groups are leveraging vishing techniques and single sign-on (SSO) abuse to gain unauthorized access and facilitate swift data exfiltration campaigns.
The operational sophistication of these groups lies in their ability to execute attacks with precision while avoiding detection through careful operational security. Their focus on SaaS infrastructure represents a strategic pivot toward environments where traditional security monitoring may be less mature. Source: Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
Critical cPanel Vulnerability Lets Attackers Bypass Login, Gain Root Access
A critical vulnerability in cPanel has been discovered that allows attackers to completely bypass authentication mechanisms and obtain root-level access to affected systems. The vulnerability, identified as CVE-2026-41940, has already been observed in active exploitation attempts in the wild prior to the availability of security patches. This represents a severe risk to hosting providers and organizations relying on cPanel for server administration.
The ability to achieve root access through login bypass presents an immediate and substantial threat to infrastructure security. Organizations running vulnerable cPanel instances should prioritize patching efforts to mitigate the risk of unauthorized system compromise. Source: Critical cPanel Vulnerability Lets Attackers Bypass Login, Gain Root Access
1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom
A supply chain attack campaign utilizing the Mini Shai-Hulud malware has compromised packages distributed through popular development platforms, affecting approximately 1,800 victims. The compromised Lightning and Intercom packages have a combined monthly download count of nearly 10 million, indicating significant potential for widespread impact across enterprise and development environments.
The attack infrastructure leveraged the domain zero.masscan.cloud as part of its command and control operations. The scale of potential exposure through these widely-used packages demonstrates the critical vulnerability present in open-source software ecosystems and the need for enhanced supply chain security measures. Source: 1,800 Hit in Mini Shai-Hulud Attack on SAP, Lightning, Intercom
Former Incident Responders Sentenced to 4 Years in Prison for Committing Ransomware Attacks
Two former incident responders, Ryan Goldberg and Kevin Martin, have been sentenced to four years in federal prison for conducting ransomware attacks against five companies during 2023. The pair utilized the ALPHV/BlackCat ransomware variant in their criminal operations, successfully extorting nearly $1.3 million from one of their victims alone. This case represents a significant insider threat scenario where individuals with legitimate security access weaponized their knowledge for criminal purposes.
The prosecution and conviction of these former security professionals underscores the serious legal consequences associated with ransomware operations and the government's commitment to pursuing cybercriminals aggressively. The insider perspective these individuals possessed likely enhanced their ability to identify vulnerabilities and circumvent security controls. Source: Former incident responders sentenced to 4 years in prison for committing ransomware attacks
Today's threat landscape reflects a convergence of external adversaries exploiting infrastructure weaknesses and internal threats leveraging privileged access. Organizations must strengthen both their technical defenses and personnel security protocols to address these multifaceted risks.
Sources & IOCs
Source articles and extracted indicators (defanged where appropriate).
- Mini Shai-HuludInformation-stealing malware delivered via compromised NPM, PyPI, and PHP packages
- Shai-HuludParent supply chain attack campaign from late 2025; Mini variant is continuation
zero.masscan.cloudData exfiltration infrastructure for Mini Shai-Hulud payload
- ALPHV/BlackCatRansomware variant used by Goldberg, Martin, and Martino in attacks on five U.S. companies; also linked to February 2024 Change Healthcare breach