BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Mr_Rot13 Hacker Group Targets cPanel Flaws for Backdoor Attacks

A threat actor known as Mr_Rot13 has been exploiting a recently disclosed critical cPanel flaw to deploy a backdoor called Filemanager on compromised systems. The vulnerability (CVE-2024-41940) affects cPanel’s WebHost Manager, allowing authentication bypass and remote takeover.

According to XLab researchers, the flaw has been abused by multiple threat actors shortly after its public disclosure last month, leading to cryptocurrency mining, ransomware, botnet spread, and backdoor implants. Monitoring shows over 2,000 attacker IPs worldwide are involved in automated attacks.

The exploitation uses a shell script to download a Go-based infector from a remote server, which then implants an SSH key for persistent access and drops a PHP web shell. That web shell injects JavaScript to steal login credentials and sends them to an attacker-controlled system.

The backdoor supports file management, remote command execution, and shell access. It also collects host data like bash history, SSH details, database passwords.

Evidence suggests Mr_Rot13 has operated silently for years, with infrastructure linked to samples dating back to 2020.

Mr_Rot13 exploits cPanel flaw, steals credentials, deploys stealthy cross-platform backdoor in global campaign.

  • Attacker identified as Mr_Rot13 exploits critical cPanel flaw (CVE-2024-41940) allowing remote authentication bypass and system takeover
  • Deploys Filemanager backdoor via Go-based infector that steals SSH keys, login credentials, implants cross-platform backdoor
  • Campaign involves over 300,000 attacker IPs globally (primarily from Germany, US, Brazil, Netherlands) with low detection rates for six years

A sophisticated cybercriminal operation has been leveraging a critical vulnerability in cPanel’s WebHost Manager (WHM) for weeks, enabling widespread server compromises. According to a new report from QiAnXin’s XLab, the flaw tracked as CVE-2024-41940 has been actively exploited since its public disclosure in late May.

- Advertisement -

Monitoring data indicates more than 300,000 attacker source IPs worldwide are currently involved in automated attacks targeting this vulnerability. Researchers note these IPs are distributed globally, primarily originating from Germany, the United States, Brazil, the Netherlands, other regions. The threat actor behind the campaign, identified as Mr_Rot13, has been operating with remarkable stealth for approximately six years.

The attack sequence begins with exploitation of the cPanel flaw to deploy a backdoor named Filemanager on compromised systems. Further analysis uncovered a shell script that downloads a Go-based infector designed to implant the compromised cPanel system with an SSH public key for persistent access, along with dropping a PHP web shell. This web shell then injects JavaScript code to serve a customized login page that steals credentials and transmits them to an attacker-controlled server encoded using the ROT13 cipher.

Once transmitted, the attack chain culminates with deployment of a cross-platform backdoor capable of infecting Windows, macOS and Linux systems. The infector also collects sensitive information including bash history, SSH data, device details, database passwords, and cPanel virtual aliases. Collected data is sent to a 3-member Telegram group created by a user named “0xWR.

There are signs that the threat actor has been operating silently in the shadows for years. This assessment is based on the fact that the command-and-control (C2) domain embedded in the JavaScript code has been put to use in a PHP-based backdoor uploaded to the VirusTotal platform in April 2022. The domain was first registered in October 2020. “Over the six years from 2020 to the present, the detection rate of Mr_Rot13’s related samples and infrastructure across security products has remained extremely low,” XLab said.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

OpenAI launches ‘Daybreak’ AI cybersecurity initiative

OpenAI launched a new Cybersecurity initiative called Daybreak to use AI for vulnerability detection...

Solana ETFs See Record Inflows, Futures Interest as SOL Targets $120

Spot Solana ETFs saw their strongest weekly inflows since February, attracting $39.23 million last...

Tesla’s $420 Price Includes Free Optimus: Piper

Analysts at Piper Sandler view Tesla's current price near $420 as a solid buying...

BitMine Slows ETH Buys; Lee Sets $62K Price Target

BitMine Immersion slowed its aggressive Ethereum accumulation, purchasing just 26,659 ETH last week compared...

Must Read

7 Best Cryptocurrency Lending Platforms in 2025 (Ranked & Reviewed)

QUICK LINKSOur MethodologyHow to Choose the Best Crypto Lending Platform: Key Factors to ConsiderIn-Depth Reviews of the 7 Best Crypto Lending Platforms1. Nexo -...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading