You are currently viewing Filemanager Fever: MrRot_13’s cPanel Exploitation Campaign Is Spreading Fast

Filemanager Fever: MrRot_13’s cPanel Exploitation Campaign Is Spreading Fast

Researchers have attributed an active exploitation campaign against a critical cPanel authentication bypass vulnerability, tracked as CVE-2026-41940, to a long-running threat actor dubbedMr_Rot13. The campaign deploys a cross-platform backdoor named Filemanager, which steals credentials and establishes persistent access across compromised Linux hosting environments.

More than 2,000 attacker source IPs worldwide have been observed conducting automated attacks against CVE-2026-41940 since its public disclosure. Exploitation activities include cryptocurrency mining, ransomware deployment, botnet propagation, and backdoor implantation.

Background on Threat Actor and Backdoor

Mr_Rot13 is a threat actor who has been operating covertly since at least October 2020. Named after their consistent use of the ROT13 cipher to obfuscate command-and-control addresses and the Telegram handle “0xWR” attributed to the group’s creator, the actor has maintained an exceptionally low detection profile over six years. A PHP backdoor deployed by the group in 2022 still carries zero antivirus detections to this day. What distinguishes Mr_Rot13 from opportunistic threat actors is their operational discipline: stable long-lived infrastructure, consistent tooling across campaigns, and a deliberate emphasis on evasion over visibility.

Their primary payload, Filemanager, is a cross-platform remote-access backdoor written in Go, with builds available for Linux, Windows, and macOS. Once active, it exposes a web-based management console on an attacker-specified port, supporting file management, remote command execution, and interactive shell access.

Vulnerability Details

FieldDetails
CVE IDCVE-2026-41940
CVSS Score9.8 (Critical)
EPSS Score67.0%
Affected VersionsAll cPanel & WHM versions after 11.40, WP Squared all versions prior to 136.1.7
Fixed VersioncPanel & WHM version 136.1.7

Attack Methodology: The Automated Infection Chain

The infection is carried out in seven phases:

Initial Exploitation: CVE-2026-41940 is abused to bypass cPanel/WHM authentication entirely, no credentials needed, full admin access granted remotely.

Infector Delivery: A shell script downloads and runs a Go-based binary from the attacker’s server via wget/curl, then deletes itself to avoid detection.

SSH Implantation: The infector hardcodes a new root password and plants an attacker-controlled SSH public key, ensuring persistent privileged access.

Webshell Deployment: A PHP webshell (“cpanel.py”) is uploaded to the cPanel CGI directory, enabling persistent file access and remote command execution.

Credential Skimming: Malicious JavaScript replaces the cPanel login page, silently harvesting usernames and passwords and sending them to a ROT13-obfuscated C2.

Filemanager Backdoor: A cross-platform backdoor (Windows/Linux/macOS) is installed from wpsock[.]com, opening a web-based remote-control console on a custom TCP port.

Data Exfiltration: Bash history, SSH keys, database passwords, and valiases are sent to the C2 server and a private Telegram group via dual redundant channels.

MITRE ATT&CK: Tactics and Techniques

IDTacticTechniqueDescription
TA0001Initial AccessT1190 – Exploit Public-Facing ApplicationCVE-2026-41940 authentication bypass on internet-facing cPanel/WHM
TA0002ExecutionT1059.004 – Unix ShellShell script delivered and executed to download and run the Go-based infector
TA0003PersistenceT1098.004 – SSH Authorized KeysAttacker-controlled SSH public key (cpanel-updater) implanted on the host
TA0003PersistenceT1505.003 – Web ShellPHP webshell (cpanel.py) dropped into the cPanel CGI directory
TA0005Defense EvasionT1070.004 – File DeletionInfector binary deleted post-execution to reduce forensic footprint
TA0006Credential AccessT1056.003 – Web Portal CaptureMalicious login page skims credentials and exfiltrates them via AJAX
TA0010ExfiltrationT1567 – Exfiltration Over Web ServiceStolen data sent to C2 and a Telegram bot as dual exfiltration channels

Indicators of Compromise (IOCs)

The following infrastructure, file artifacts, and network indicators have been identified as being used in the Mr_Rot13:

TypeIndicator
Scanner IPs178[.]249[.]209[.]182, 149[.]102[.]229[.]146
C2 Domainwrned[.]com
Downloader Domaincp.dene[.]de.com
Filemanager Domainwpsock[.]com
Credential Exfil Endpointwrned[.]com/log.php (ROT13 encoded in JS as: uggcf://jearq[.]pbz/ybt.cuc)
Data Reporting Endpointcp.dene[.]de.com/collect.php
Infector FilenameUpdate (ELF 64-bit, x86-64, statically linked, stripped)

Visual Attack Flow

Auth Bypass via CVE-2026-41940 -> CRLF Injection in Session File -> Encryption Layer Skipped -> Session Promoted to Admin -> Shell Script Delivered -> Go Infector Executed -> SSH Key Implanted -> PHP Webshell Dropped -> Login Page Hijacked -> Credentials Exfiltrated -> Filemanager Backdoor Installed -> Data Sent to C2 + Telegram -> Persistent Remote Control Established

Key Takeaways & Mitigation

  1. Patch cPanel and WHM immediately.
  2. Restrict cPanel / WHM Interfaces to Trusted IPs
  3. Audit SSH Authorized Keys Immediately
  4. Monitor for Anomalous Outbound Connections

Instantly Fix Risks with Saner Patch Management

Saner patch management is a continuous, automated, and integrated software that instantly fixes risks exploited in the wild. The software supports major operating systems like Windows, Linux, and macOS, as well as 550+ third-party applications.

It also allows you to set up a safe testing area to test patches before deploying them in a primary production environment. Saner patch management additionally supports a patch rollback feature in case of patch failure or a system malfunction.

Experience the fastest and most accurate patching software here.