GitHub, cPanel, ADT and Robinhood: Week in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for months

GitHub, cPanel, ADT and Robinhood: Week in review: High-severity LPE vulnerability in the Linux kernel, cPanel 0-day exploited for months

Cybersecurity Roundup: Key Incidents and Developments from April 2026

Last week saw a surge in cybersecurity threats, regulatory actions, and technological advancements highlighting both emerging risks and evolving defenses. Here’s a breakdown of the most critical developments:

AI and Automation: New Frontiers for Cybercrime and Defense

  • AI-Powered Cybercrime: Threat actors are leveraging gig platforms like RentAHuman to hire AI agents for tasks such as physical surveillance, item delivery, and in-person meetings, blurring the line between digital and real-world attacks.
  • AI Supply Chain Risks: Cisco released an open-source toolkit to verify AI model lineage, addressing concerns that enterprises lack visibility into modifications made to downloaded models from repositories like Hugging Face.
  • AI-Driven Attacks: OpenAI warned that attackers are scaling operations using AI, while Anthropic adopted a more restrictive approach to advanced AI access. Meanwhile, automated LLM red teaming tools are evolving, with Capital One proposing Adaptive Instruction Composition to prioritize high-impact attack vectors.
  • AI Traffic Surge: AI workflows are generating larger, less predictable data flows, with Backblaze reporting a shift toward high-bandwidth traffic between fewer endpoints.

Data Breaches and Privacy Violations

  • Massive Fines: U.S. state privacy regulators imposed $3.425 billion in fines in 2025 nearly double the 2024 total reflecting stricter enforcement trends.
  • High-Profile Breaches:
    • ADT confirmed a breach on April 20, exposing customer data after hackers accessed its systems.
    • Udemy suffered a breach claimed by ShinyHunters, leaking 1.4 million records with sensitive user details.
    • UK Biobank: Medical data from 500,000 British volunteers was listed for sale on Alibaba, raising concerns about genetic and clinical data misuse.
  • Academic Data Leaks: A study of 2.7 million arXiv submissions found that 88% of LaTeX source files contained unintended public disclosures, including drafts, comments, and project data.

Critical Vulnerabilities and Exploits

  • Windows Zero-Day (CVE-2026-32202): Actively exploited in the wild, this Windows Shell spoofing flaw allows attackers to force authentication to malicious servers. It stems from an incomplete patch for a prior vulnerability (CVE-2026-21510) linked to APT28 (Fancy Bear).
  • Linux Kernel Flaw (CVE-2026-31431): A nine-year-old privilege escalation bug ("Copy Fail") affects nearly all major Linux distributions since 2017, with a public proof-of-concept exploit available.
  • GitHub Enterprise Server RCE (CVE-2026-3854): While patched on GitHub.com, 88% of self-hosted instances remain vulnerable to remote code execution.
  • cPanel Zero-Day (CVE-2026-41940): Exploited since February 2026, this authentication bypass flaw in the web hosting control panel highlights delayed patching risks.
  • Vect Ransomware Bug: A flaw in the Vect ransomware-as-a-service (RaaS) effectively turns it into a data wiper, with affiliates encrypting files irreversibly.

Threat Actor Activity

  • UNC6692: A new threat group impersonated IT helpdesk staff via Microsoft Teams, tricking employees into downloading malware disguised as a "Mailbox Repair Utility" in a campaign active since December 2025.
  • Robinhood Phishing: Cybercriminals hijacked Robinhood’s email systems to send phishing emails to users, with reports surfacing on April 26.
  • Black Axe Arrests: Swiss police arrested 10 suspected members of the Black Axe cybercrime gang, including its Southern Europe "Regional Head," in a coordinated raid on April 28.
  • Roblox Account Theft: Ukrainian police detained three suspects accused of stealing and reselling 600,000 Roblox accounts via malware disguised as game tools.
  • SMS Blaster Operation: Canadian authorities arrested three men for operating a mobile cell tower spoofing device, used to send fraudulent SMS messages across the Greater Toronto Area.

Regulatory and Law Enforcement Actions

  • Chinese Hacker Extradited: Xu Zewei, a Chinese national, was extradited from Italy to the U.S. for allegedly breaching thousands of systems, including those tied to COVID-19 research.
  • Albanian Call Center Bust: A joint operation dismantled a €50 million fraud ring operating from Albania, with 10 arrests and €900,000 seized.

Tooling and Infrastructure Updates

  • IPFire DNS Firewall: The open-source firewall now includes built-in domain blocking, replacing third-party tools like Pi-hole for malware and phishing protection.
  • Open-Source Privacy Tools:
    • BleachBit 6.0.0 enhanced secure deletion and browser cleaning for Windows/Linux.
    • Kiji Privacy Proxy (by Dataiku) masks PII before prompts reach external AI services.
    • SimpleX Chat released a user-identifier-free encrypted messenger.
  • Linux Storage: Stratis 3.9.0 added online encryption and cache-less pool startup for improved security.
  • Proxmox Backup Server 4.2 introduced S3 storage support and parallel sync jobs.

SOC and Identity Challenges

  • SOC Metrics Under Scrutiny: The UK’s NCSC warned that ticket-based metrics (e.g., IT service desk KPIs) can undermine security operations by failing to measure real attack detection.
  • AI and IAM Gaps: Identity and access management (IAM) systems, designed for human users, struggle with AI agents that bypass traditional authentication. The FIDO Alliance is exploring new frameworks for AI-driven payments.
  • Shadow AI Risks: 31% of employees using AI tools receive no employer training, widening the gap between adoption and governance.

Industrial and Infrastructure Threats

  • ICS Blind Spots: Researchers identified three critical gaps in industrial control system (ICS) intrusion detection, complicating plant security.
  • GPS Spoofing Detection: Oak Ridge National Laboratory developed a portable tool to expose GPS signal manipulation in transit networks.

Open-Source and Developer Tools

  • Visual Studio Updates: GitHub Copilot now integrates cloud agents for scalable task execution, while VS Code 1.118 added auto-model selection for Copilot CLI.
  • Warp Terminal: The AI-centric terminal open-sourced its client under the AGPL license, with OpenAI as a founding sponsor.
  • LuLu Firewall: A free macOS tool now monitors outbound connections to block unauthorized data exfiltration.

Emerging Trends

  • Bad Bots: AI agents now account for 40% of internet traffic, alongside traditional "good" and "bad" bots, per Thales’ 2026 report.
  • AI Prompt Confidentiality: Researchers raised concerns about unpublished research and proprietary data being leaked via commercial AI tools like Research Rabbit and Elicit AI.
  • Met Police AI Scrutiny: London’s Metropolitan Police faced backlash for using Palantir’s AI to monitor officers’ movements for misconduct investigations.

This wave of incidents underscores the accelerating convergence of AI, automation, and cyber threats while also highlighting the urgent need for adaptive defenses, stricter data governance, and proactive vulnerability management.

Source: https://www.helpnetsecurity.com/2026/05/03/week-in-review-high-severity-lpe-vulnerability-in-the-linux-kernel-cpanel-0-day-exploited-for-months/

GitHub cybersecurity rating report: https://www.rankiteo.com/company/github

cPanel cybersecurity rating report: https://www.rankiteo.com/company/cpanel

ADTECH cybersecurity rating report: https://www.rankiteo.com/company/adtech

Robinhood cybersecurity rating report: https://www.rankiteo.com/company/robinhood

"id": "GITCPAADTROB1777796722",
"linkid": "github, cpanel, adtech, robinhood",
"type": "Vulnerability",
"date": "4/2026",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'customers_affected': 'Yes',
                        'industry': 'Security Services',
                        'location': 'United States',
                        'name': 'ADT',
                        'type': 'Corporation'},
                       {'customers_affected': '1.4 million',
                        'industry': 'Education Technology',
                        'location': 'United States',
                        'name': 'Udemy',
                        'type': 'Corporation'},
                       {'customers_affected': '500,000 volunteers',
                        'industry': 'Healthcare/Biomedical Research',
                        'location': 'United Kingdom',
                        'name': 'UK Biobank',
                        'type': 'Research Organization'},
                       {'customers_affected': '600,000 accounts',
                        'industry': 'Gaming/Technology',
                        'location': 'United States',
                        'name': 'Roblox',
                        'type': 'Corporation'},
                       {'customers_affected': 'Yes',
                        'industry': 'Financial Services',
                        'location': 'United States',
                        'name': 'Robinhood',
                        'type': 'Corporation'},
                       {'customers_affected': '2.7 million submissions',
                        'industry': 'Research/Academia',
                        'location': 'Global',
                        'name': 'arXiv',
                        'type': 'Academic Repository'},
                       {'customers_affected': '88% of self-hosted instances',
                        'industry': 'Technology/Software Development',
                        'location': 'Global',
                        'name': 'GitHub Enterprise Server Users',
                        'type': 'Corporation/Organization'},
                       {'customers_affected': 'Yes',
                        'industry': 'Web Hosting',
                        'location': 'Global',
                        'name': 'cPanel Users',
                        'type': 'Corporation/Organization'}],
 'attack_vector': ['AI Agents',
                   'Phishing (Microsoft Teams)',
                   'Email Hijacking',
                   'Malware',
                   'Zero-Day Exploits',
                   'GPS Signal Manipulation',
                   'Mobile Cell Tower Spoofing',
                   'Backdoors'],
 'data_breach': {'data_encryption': ['Vect Ransomware (irreversible '
                                     'encryption)'],
                 'data_exfiltration': ['UK Biobank data listed for sale on '
                                       'Alibaba',
                                       'Roblox account theft',
                                       'ADT customer data breach'],
                 'file_types_exposed': ['LaTeX source files (arXiv)',
                                        'Medical records (UK Biobank)'],
                 'number_of_records_exposed': ['1.4 million (Udemy)',
                                               '500,000 (UK Biobank)',
                                               '600,000 (Roblox)',
                                               '2.7 million (arXiv)'],
                 'personally_identifiable_information': ['Udemy user details',
                                                         'ADT customer data',
                                                         'Roblox account '
                                                         'information'],
                 'sensitivity_of_data': ['High (Medical/Genetic Data)',
                                         'Medium (PII, User Accounts)',
                                         'Low (Research Drafts)'],
                 'type_of_data_compromised': ['Customer Data',
                                              'Medical Data',
                                              'User Accounts',
                                              'Research Data',
                                              'Personally Identifiable '
                                              'Information (PII)',
                                              'Genetic Data',
                                              'Clinical Data']},
 'date_publicly_disclosed': '2026-04',
 'description': 'Last week saw a surge in cybersecurity threats, regulatory '
                'actions, and technological advancements highlighting both '
                'emerging risks and evolving defenses. Key developments '
                'include AI-powered cybercrime, high-profile data breaches, '
                'critical vulnerabilities, threat actor activity, regulatory '
                'actions, and updates in cybersecurity tooling and '
                'infrastructure.',
 'impact': {'brand_reputation_impact': ['ADT',
                                        'Udemy',
                                        'UK Biobank',
                                        'Robinhood'],
            'data_compromised': ['1.4 million Udemy records',
                                 '500,000 UK Biobank medical records',
                                 '600,000 Roblox accounts',
                                 'ADT customer data',
                                 '88% of 2.7 million arXiv submissions '
                                 '(unintended disclosures)'],
            'financial_loss': '€50 million (Albanian Call Center Bust) + '
                              '$3.425 billion in fines (2025 US privacy '
                              'violations)',
            'identity_theft_risk': ['Roblox accounts',
                                    'Udemy user details',
                                    'ADT customer data'],
            'legal_liabilities': ['$3.425 billion in fines (2025 US privacy '
                                  'violations)',
                                  'Regulatory violations (GDPR, state privacy '
                                  'laws)'],
            'operational_impact': ['AI workflow disruptions',
                                   'Identity and Access Management (IAM) '
                                   'failures',
                                   'SOC inefficiencies due to ticket-based '
                                   'metrics',
                                   'Data exfiltration risks'],
            'systems_affected': ['Windows Systems (CVE-2026-32202)',
                                 'Linux Distributions (CVE-2026-31431)',
                                 'GitHub Enterprise Servers (CVE-2026-3854)',
                                 'cPanel Hosting Panels (CVE-2026-41940)',
                                 'Industrial Control Systems (ICS)',
                                 'Mobile Networks (GPS Spoofing)']},
 'initial_access_broker': {'data_sold_on_dark_web': ['UK Biobank data',
                                                     'Roblox accounts'],
                           'entry_point': 'Microsoft Teams (UNC6692)'},
 'investigation_status': 'Ongoing',
 'lessons_learned': ['AI and automation are blurring the line between digital '
                     'and real-world attacks.',
                     'Enterprises lack visibility into AI model modifications, '
                     'increasing supply chain risks.',
                     'Traditional IAM systems are ill-equipped to handle AI '
                     'agents.',
                     'Ticket-based SOC metrics fail to measure real attack '
                     'detection.',
                     'Delayed patching leaves critical vulnerabilities (e.g., '
                     'cPanel, GitHub Enterprise Server) exposed for months.',
                     'Unintended data disclosures in academic repositories '
                     '(e.g., arXiv) pose significant risks.',
                     'AI-driven attacks are scaling faster than defenses can '
                     'adapt.'],
 'motivation': ['Financial Gain',
                'Data Theft',
                'Espionage',
                'Cybercrime',
                'Fraud',
                'AI-Powered Scaling'],
 'post_incident_analysis': {'corrective_actions': ['Patch critical '
                                                   'vulnerabilities '
                                                   'immediately.',
                                                   'Implement AI model lineage '
                                                   'verification.',
                                                   'Update IAM frameworks for '
                                                   'AI agents.',
                                                   'Replace ticket-based SOC '
                                                   'metrics.',
                                                   'Enhance monitoring for '
                                                   'AI-driven traffic and '
                                                   'outbound connections.',
                                                   'Provide mandatory AI tool '
                                                   'training for employees.',
                                                   'Deploy GPS spoofing '
                                                   'detection tools.'],
                            'root_causes': ['Incomplete patching (e.g., '
                                            'CVE-2026-21510 leading to '
                                            'CVE-2026-32202).',
                                            'Delayed vulnerability patching '
                                            '(e.g., cPanel, GitHub Enterprise '
                                            'Server).',
                                            'Lack of AI model lineage '
                                            'visibility.',
                                            'IAM systems not designed for AI '
                                            'agents.',
                                            'Unintended data disclosures in '
                                            'academic repositories.',
                                            'AI-powered scaling of cybercrime '
                                            'operations.',
                                            'Shadow AI adoption without '
                                            'governance.']},
 'ransomware': {'data_encryption': 'Yes (irreversible)',
                'ransomware_strain': 'Vect'},
 'recommendations': ["Adopt AI model lineage verification tools (e.g., Cisco's "
                     'open-source toolkit).',
                     'Enhance IAM frameworks to account for AI agents (e.g., '
                     'FIDO Alliance initiatives).',
                     'Replace ticket-based SOC metrics with attack '
                     'detection-focused KPIs.',
                     'Prioritize patching for critical vulnerabilities (e.g., '
                     'zero-days in Windows, Linux, GitHub Enterprise Server).',
                     'Implement secure deletion and browser cleaning tools '
                     '(e.g., BleachBit 6.0.0).',
                     'Use privacy proxies (e.g., Kiji) to mask PII before AI '
                     'prompts.',
                     'Monitor outbound connections (e.g., LuLu Firewall) to '
                     'prevent data exfiltration.',
                     'Deploy GPS spoofing detection tools for transit '
                     'networks.',
                     'Provide mandatory training for employees using AI tools '
                     'to mitigate shadow AI risks.'],
 'references': [{'date_accessed': '2026-04',
                 'source': 'Cybersecurity Roundup (April 2026)'},
                {'date_accessed': '2026-04',
                 'source': 'Cisco AI Model Lineage Toolkit'},
                {'date_accessed': '2026-04',
                 'source': 'OpenAI and Anthropic AI Access Policies'},
                {'date_accessed': '2026-04',
                 'source': 'Backblaze AI Traffic Report'},
                {'date_accessed': '2026-04',
                 'source': 'US State Privacy Regulators Fines Report (2025)'},
                {'date_accessed': '2026-04',
                 'source': 'arXiv LaTeX Disclosure Study'},
                {'date_accessed': '2026-04',
                 'source': 'NCSC SOC Metrics Warning'},
                {'date_accessed': '2026-04',
                 'source': 'Thales Bad Bots Report (2026)'}],
 'regulatory_compliance': {'fines_imposed': '$3.425 billion (2025 US privacy '
                                            'violations)',
                           'legal_actions': ['Xu Zewei extradition',
                                             'Black Axe arrests',
                                             'Albanian call center bust'],
                           'regulations_violated': ['GDPR',
                                                    'US State Privacy Laws',
                                                    'Healthcare Data '
                                                    'Protection Laws']},
 'response': {'enhanced_monitoring': ['AI traffic monitoring (Backblaze)',
                                      'Outbound connection monitoring (LuLu '
                                      'Firewall)'],
              'law_enforcement_notified': ['Swiss Police (Black Axe Arrests)',
                                           'Canadian Authorities (SMS Blaster '
                                           'Operation)',
                                           'Ukrainian Police (Roblox Account '
                                           'Theft)',
                                           'Italian Authorities (Xu Zewei '
                                           'Extradition)',
                                           'Albanian Police (Call Center '
                                           'Bust)'],
              'remediation_measures': ['Patches for CVE-2026-32202, '
                                       'CVE-2026-31431, CVE-2026-3854, '
                                       'CVE-2026-41940',
                                       'Open-source toolkit for AI model '
                                       'lineage verification (Cisco)',
                                       'Portable GPS spoofing detection tool '
                                       '(Oak Ridge National Laboratory)']},
 'threat_actor': ['UNC6692',
                  'APT28 (Fancy Bear)',
                  'ShinyHunters',
                  'Black Axe',
                  'Xu Zewei (Chinese Hacker)',
                  'Roblox Account Thieves',
                  'SMS Blaster Operators'],
 'title': 'Cybersecurity Roundup: Key Incidents and Developments from April '
          '2026',
 'type': ['Data Breach',
          'Ransomware',
          'Phishing',
          'Zero-Day Exploit',
          'AI-Powered Attack',
          'GPS Spoofing',
          'SMS Blaster',
          'Account Theft'],
 'vulnerability_exploited': ['CVE-2026-32202 (Windows Shell Spoofing)',
                             'CVE-2026-31431 (Linux Kernel Privilege '
                             'Escalation)',
                             'CVE-2026-3854 (GitHub Enterprise Server RCE)',
                             'CVE-2026-41940 (cPanel Authentication Bypass)',
                             'Incomplete Patch (CVE-2026-21510)',
                             'Vect Ransomware Bug']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.