Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
900 FreePBX Systems Compromised by Web Shell Attacks

900 FreePBX Systems Compromised by Web Shell Attacks

Posted on February 27, 2026 By CWS

Recent reports indicate that around 900 instances of Sangoma FreePBX are compromised, remaining vulnerable due to web shell attacks. These incidents are the result of exploiting a command injection flaw, which began in December 2025.

Sangoma FreePBX Vulnerability Details

Sangoma FreePBX, an open-source graphical interface for managing Asterisk-based IP telephony, was targeted due to a vulnerability tracked as CVE-2025-64328. This critical flaw, with a CVSS score of 8.6, affects the filestore module in the endpoint manager’s administrative interface. The vulnerability was identified and patched in November 2025, yet many systems are still at risk.

Attack Exploitation and Impact

The command injection issue allows attackers with any level of user access to execute arbitrary commands and gain remote control of the system. A hacking group known as INJ3CTOR3 has been actively exploiting this vulnerability to deploy a web shell named EncystPHP. This tool provides attackers with remote execution capabilities and persistent system access.

Fortinet disclosed that INJ3CTOR3 had been using this vulnerability for over a month, leading to widespread deployment of the web shell. These activities align with known attack patterns associated with the group.

Current Status and Recommendations

The Shadowserver Foundation, a non-profit organization, has reported that around 900 FreePBX instances are still compromised, primarily through CVE-2025-64328. Most affected systems are located in the United States, with significant numbers also found in Brazil, Canada, Germany, France, the UK, Italy, and the Netherlands.

To mitigate the risk, users are urged to update the filestore module to the latest version, limit administrative access to authorized personnel, and block known malicious access sources. Additionally, the US cybersecurity agency CISA has added this vulnerability to its Known Exploited Vulnerabilities list, highlighting its critical nature.

Related cybersecurity threats include the Aeternum Botnet Loader and SystemBC infections, emphasizing the need for vigilance and timely updates.

Security Week News Tags:CISA, CVE-2025-64328, Cybersecurity, Fortinet, FreePBX, INJ3CTOR3, Sangoma, Shadowserver Foundation, Vulnerability, web shell

Post navigation

Previous Post: ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach
Next Post: Critical FreeBSD Flaw Risks System Security Breach

Related Posts

TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking TP-Link Patches Vulnerability Exposing VIGI Cameras to Remote Hacking Security Week News
Organizations Warned of Exploited Adobe AEM Forms Vulnerability Organizations Warned of Exploited Adobe AEM Forms Vulnerability Security Week News
Honoring Our Veteran Readers: Thank You for Your Service Honoring Our Veteran Readers: Thank You for Your Service Security Week News
OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking Security Week News
Japan Issues OT Security Guidance for Semiconductor Factories Japan Issues OT Security Guidance for Semiconductor Factories Security Week News
HyperBunker Raises Seed Funding to Launch Next-Generation Anti-Ransomware Device HyperBunker Raises Seed Funding to Launch Next-Generation Anti-Ransomware Device Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • April 2026 Microsoft Patch Tuesday: Key Vulnerabilities
  • Fortinet Urges Immediate Patching for Critical Vulnerabilities
  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws
  • Earn CPE Credits with SRA’s Purple Team Exercises
  • Critical PHP Composer Vulnerabilities Patched

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • April 2026 Microsoft Patch Tuesday: Key Vulnerabilities
  • Fortinet Urges Immediate Patching for Critical Vulnerabilities
  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws
  • Earn CPE Credits with SRA’s Purple Team Exercises
  • Critical PHP Composer Vulnerabilities Patched

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark