Skip to content
Briefings are running a touch slower this week while we rebuild the foundations.See roadmap
'Sorry' ransomware
TechnologyZZ

'Sorry' ransomware

Novel ransomware deploying Go-based Linux encryptors on compromised cPanel hosts since early 2026.

Last refreshed: 8 May 2026 · Appears in 1 active topic

Key Question

How many hosting providers were hit by 'Sorry' ransomware during the cPanel zero-day window?

Timeline for 'Sorry' ransomware

#330 Apr

Deployed a Go-language Linux encryptor on cPanel hosts compromised via CVE-2026-41940

Cybersecurity: Threats and Defences: cPanel zero-day ran 65 days before patch; Sorry ransomware active
View full timeline →
Common Questions
What is 'Sorry' ransomware and how does it work?
'Sorry' ransomware deploys Go-language Linux encryptors on web-hosting servers compromised via the cPanel CVE-2026-41940 vulnerability. The group exploited a 65-day zero-day window before a patch was available.Source: WatchTowr Labs / CISA
Which websites are at risk from the cPanel 'Sorry' ransomware attack?
Any website hosted on a shared-hosting server running an unpatched version of cPanel & WHM is potentially at risk. Rapid7 identified approximately 1.5 million cPanel instances exposed to the internet.Source: Rapid7
Why do ransomware groups use Go-language encryptors?
Go compiles easily to multiple platforms and produces self-contained binaries with few dependencies. This makes them harder to reverse-engineer and faster to deploy across different operating systems.

Background

'Sorry' ransomware is a newly observed ransomware operation first identified actively deploying Go-language Linux encryptors on web-hosting servers compromised through CVE-2026-41940, a critical CRLF injection flaw in cPanel's login daemon. The group was active on hosts exposed during the 65-day zero-day window that ran from 23 February to 28 April 2026, when WebPros shipped an emergency patch.

The group targets shared-hosting infrastructure, making cPanel's dominant market position particularly advantageous as an attack surface. Go-based encryptors are increasingly preferred by ransomware operators because they compile easily to multiple platforms (Windows, Linux, macOS) and produce binaries with few dependencies, complicating reverse engineering. The choice of Linux encryptors reflects a deliberate focus on server-side infrastructure rather than endpoint workstations.

Little is publicly known about the group's structure, affiliation, or ransom demands. The name 'Sorry' appears in ransom notes or malware artefacts but the group has not established a public leak site as of May 2026. Its emergence during an unpatched zero-day window suggests either direct knowledge of the vulnerability ahead of public disclosure or rapid exploitation immediately following CVE publication.

Source Material