Malware & RansomwareMEDIUM

EncystPHP Webshell - Scans Indicate Growing Threat

#EncystPHP#webshell#FreePBX#Fortinet#cybersecurity

Original Reporting

SASANS ISC

AI Intelligence Briefing

CyberPings AIΒ·Reviewed by Rohit Rana
Severity LevelMEDIUM

Moderate risk β€” monitor and plan remediation

🦠
🦠 MALWARE PROFILE
Malware NameEncystPHP
Malware TypeWebshell
Threat ActorUnknown
Target PlatformFreePBX
Delivery MethodWeb Exploitation
Persistence MechanismWebshell Installation
C2 Infrastructureβ€”
CapabilitiesRemote Control, Data Exfiltration
IOCs Availableβ€”
Detection Rateβ€”
MITRE ATT&CKT1071.001 (Application Layer Protocol)
🎯

Basically, attackers are looking for a specific web tool to exploit systems.

Quick Summary

Scans for the EncystPHP webshell have been detected, targeting vulnerable FreePBX systems. This trend underscores the need for stronger security measures. Stay informed and protect your systems from evolving cyber threats.

What Happened

Recently, cybersecurity experts have observed a surge in scanning activities targeting the EncystPHP webshell. This webshell is particularly favored by attackers looking to compromise vulnerable systems, especially those running FreePBX. The scans indicate that cybercriminals are not only searching for webshells that require minimal authentication but are also adapting their strategies to deploy webshells with more complex credentials.

Who's Being Targeted

The primary targets of these scans are systems that are known to be vulnerable, particularly FreePBX installations. FreePBX is an open-source web-based GUI that manages Asterisk, a popular open-source telephony platform. Attackers aim to exploit these systems to gain unauthorized access and control.

Signs of Infection

Organizations should be on the lookout for unusual activities that may indicate the presence of webshells like EncystPHP. Signs can include:

  • Unexpected changes in system files or configurations.
  • Unauthorized access attempts or logins.
  • Increased network traffic to and from the FreePBX server.

How to Protect Yourself

To mitigate the risk of infection from webshells like EncystPHP, consider the following protective measures:

  • Implement strong authentication: Use complex passwords and multi-factor authentication for all administrative access.
  • Regularly update software: Ensure that FreePBX and all associated software are up-to-date to patch vulnerabilities.
  • Monitor logs: Keep an eye on access logs for any suspicious activities that could indicate an attempted breach.

Conclusion

The emergence of scans for the EncystPHP webshell highlights the ever-evolving landscape of cyber threats. As attackers become more sophisticated, it's crucial for organizations to remain vigilant and proactive in their security measures. By understanding the tactics used by cybercriminals, businesses can better defend against potential breaches.

πŸ” How to Check If You're Affected

  1. 1.Check for unauthorized changes in FreePBX configurations.
  2. 2.Monitor access logs for unusual login attempts.
  3. 3.Review network traffic for any anomalies related to FreePBX.

🏒 Impacted Sectors

Technology

πŸ—ΊοΈ MITRE ATT&CK Techniques

Pro Insight

πŸ”’ Pro insight: The shift towards more complex credentials in webshells indicates a strategic evolution in attacker methodologies, necessitating enhanced detection capabilities.

Sources

Original Report

SASANS ISC
Read Original

Related Pings

HIGHMalware & Ransomware

ClickFix - New Method Discovered to Infect Macs

ClickFix has found a new way to infect Macs using Script Editor, bypassing macOS warnings. This method makes it easier for users to fall victim to malware. Stay informed and protect your devices from evolving threats.

Malwarebytes LabsΒ·
HIGHMalware & Ransomware

Mirax Android Trojan Turns Devices Into Residential Proxies

The Mirax Android Trojan is spreading across Europe, turning devices into residential proxies for cybercriminals. With over 200,000 accounts targeted, this malware poses a serious risk. Stay informed and protect your devices from this evolving threat.

Infosecurity MagazineΒ·
HIGHMalware & Ransomware

MSBuild LOLBin - Hackers Launch Fileless Windows Attacks

Hackers are using MSBuild.exe to launch fileless attacks, evading detection. This trend poses serious risks to organizations relying on traditional security measures. It's crucial to adapt and enhance security strategies to combat these evolving threats.

Cyber Security NewsΒ·
HIGHMalware & Ransomware

Storm Infostealer - New Malware Hijacks Sessions Remotely

A new infostealer named Storm is changing the game in credential theft. It hijacks browser sessions and sends data to attackers, bypassing traditional security. This poses serious risks to users and organizations alike. Stay informed to protect your data.

BleepingComputerΒ·
HIGHMalware & Ransomware

VIPERTUNNEL - Hackers Deploy Python Backdoor via Fake DLL

A new Python backdoor, VIPERTUNNEL, is infiltrating enterprise networks. It disguises itself in fake DLL files, creating a SOCKS5 proxy for stealthy access. Organizations need to enhance their defenses against this sophisticated threat.

Cyber Security NewsΒ·
HIGHMalware & Ransomware

APT37 Uses Facebook Social Engineering to Spread RokRAT, New Insights Revealed

APT37 has launched a new targeted intrusion campaign using social media and tampered software to spread RokRAT malware. Learn how they exploit trust and disguise malicious activities.

The Hacker NewsΒ·