Over 900 FreePBX Instances Compromised via Critical Flaw

Article Highlights
Off On

Cybersecurity researchers recently uncovered a massive breach affecting more than nine hundred Sangoma FreePBX instances across North America and South America, signaling a major shift in how threat actors target voice-over-IP infrastructure. This ongoing campaign utilizes a high-severity vulnerability to gain control over communication servers, leaving organizations vulnerable to data theft and financial exploitation.

The Global Reach of the FreePBX Mass Compromise

The scale of this campaign spans multiple continents, with a heavy concentration of victims in the United States, Canada, and Brazil. This widespread exploitation highlights the vulnerability of communication systems that organizations often overlook during routine security audits.

Because these instances are frequently connected to the public internet for remote administration, they provide an attractive entry point for hackers seeking to execute remote commands. The impact of such a breach extends beyond the telephony system, potentially exposing the entire corporate network to further intrusion.

The Evolution of Open-Source VoIP Vulnerabilities

Open-source private branch exchange systems serve as the backbone for modern business telephony, making them high-value targets for cybercrime. The discovery of CVE-2025-64328 demonstrates how administrative interfaces remain a primary weak point in the software supply chain.

Such vulnerabilities allow attackers to bypass standard defenses, shifting the focus from simple data theft to deep infrastructure manipulation. This trend toward targeting VoIP modules suggests that threat actors are becoming more specialized in their methods of bypassing enterprise firewalls.

Anatomy of the CVE-2025-64328 Exploitation Campaign

The technical progression of these attacks follows a structured path from initial probe to full persistent access. Sophisticated groups monitor for unpatched modules to launch automated exploitation scripts across the global web.

1. Exploiting the High-Severity Command Injection Flaw

The vulnerability resides within the filestore module of FreePBX, where authenticated users find a path to bypass security controls. By injecting malicious code into specific fields, attackers trigger unauthorized command execution on the underlying server.

Understanding the “Asterisk” User Context

Commands executed through this flaw run under the asterisk user context, which possesses significant privileges over the telephony software. This level of access is sufficient to modify call routing, listen to recordings, or access sensitive configuration files.

The Risks of Unauthorized Remote Shell Access

Gaining a remote shell provides a bridge to the broader internal network, turning a simple phone system into a launchpad for lateral movement. This access allows for the installation of additional payloads that can persist even after software updates.

2. Deployment of the EncystPHP Web Shell by INJ3CTOR3

The INJ3CTOR3 cyber fraud group emerged as the primary threat actor deploying the EncystPHP web shell. This custom malware is designed specifically to maintain a hidden presence while giving the group full control over the compromised host.

Mechanics of Administrative Context Manipulation

By manipulating administrative contexts, the web shell hides its activities from standard system logs and management views. It creates a secondary management layer that only the attackers can access, effectively locking legitimate administrators out of the security conversation.

How Malware Facilitates Unauthorized Outbound Calling

The primary goal often involves toll fraud, where the malware initiates thousands of unauthorized outbound calls to premium-rate numbers. This process generates massive revenue for the attackers while leaving the victimized organization with exorbitant telecommunications bills.

3. Inclusion in the CISA Known Exploited Vulnerabilities Catalog

Government agencies took notice of the escalating threat, leading to a formal response to protect critical national infrastructure. The rapid inclusion of this flaw in official warning lists underscores the immediate danger it poses to public and private sectors.

Implications of the 2026 KEV Catalog Update

The early 2026 update to the Known Exploited Vulnerabilities catalog officially flagged CVE-2025-64328 as a high-priority risk. This designation requires federal agencies and affiliated partners to meet strict deadlines for applying security patches and verifying system integrity.

Why Government Recognition Accelerates Remediation Timelines

Recognition by CISA forces a faster response from software vendors and internal IT departments alike. When a vulnerability is cataloged this way, it moves from a theoretical bug to a mandatory fix, driving higher compliance across the entire industry.

Essential Takeaways from the Sangoma Security Crisis

  • Over 900 global instances are currently confirmed as compromised.
  • The flaw (CVE-2025-64328) allows for full host takeover via command injection.
  • The INJ3CTOR3 group is actively using the EncystPHP web shell for financial fraud.
  • Immediate patching to version 17.0.3 is the only definitive fix.
  • CISA has mandated remediation for all relevant organizations.

Broader Implications for Telecommunications and Fraud Prevention

This campaign reflects a growing trend where vishing and toll fraud intersect with traditional server exploitation. As groups refine their ability to bypass firewalls through administrative modules, securing legacy VoIP hardware becomes a long-term challenge for modern IT teams.

Moreover, the financial impact of these breaches suggests that telecommunications fraud is becoming a primary revenue stream for organized cybercrime. Organizations must rethink their approach to telephony security by treating voice servers with the same rigor as data servers.

Securing the Future of FreePBX Environments

System administrators implemented a defense-in-depth approach to mitigate these recurring risks in the telephony sector. They established strict network segmentation for control panels and adopted proactive monitoring to detect unusual outbound traffic. These actions finalized the transition toward more resilient communication environments that prioritize administrative security over simple convenience. Teams evaluated their update cycles and ensured that mission-critical modules received immediate attention whenever high-severity flaws surfaced.

Explore more

Hollow-Core Fiber Revolutionizes AI Data Center Networking

The Dawn of a New Connectivity Standard for the AI Era The velocity at which data traverses the globe has finally hit a physical ceiling, forcing a fundamental reconsideration of the materials that have powered the internet for over half a century. In the current landscape, the rise of Artificial Intelligence is the dominant force reshaping digital infrastructure. As large

How Will Data Centers Manage the AI Energy Crisis?

The sheer velocity of the artificial intelligence revolution has transformed the global energy landscape from a predictable utility market into a volatile frontier where silicon and electricity collide with unprecedented force. For decades, the data center existed as a quiet background utility, a necessary but largely invisible support system for corporate emails and static web pages. However, the rise of

Is Aeternum C2 the End of Traditional Botnet Takedowns?

The landscape of global cybercrime has undergone a radical transformation as malicious actors transition from vulnerable, centralized server architectures to the immutable and distributed nature of modern blockchain ecosystems. For decades, the standard protocol for law enforcement agencies involved a coordinated “whack-a-mole” strategy where command-and-control servers were seized, or malicious domains were blacklisted to sever the connection between attackers and

How Does the New Dohdoor Malware Evade Detection?

The rapid evolution of cyber espionage has introduced a formidable new adversary that specifically preys upon the structural vulnerabilities of American healthcare and educational institutions. This recently identified threat actor, designated by security researchers as UAT-10027, has been orchestrating a sophisticated multi-stage intrusion campaign since the closing months of 2025. At the heart of this activity is a previously undocumented

Go Supply Chain Attacks – Review

The modern software supply chain operates on a delicate architecture of inherited trust where a single hijacked dependency can bypass the most rigorous perimeter defenses in seconds. Within this framework, the Go programming language has emerged as a cornerstone for cloud-native engineering, offering unparalleled efficiency for microservices and DevOps automation. Its dependency management relies on the go.mod and go.sum files,