HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Threat Intel: Scans Target EncystPHP Webshell on Vulnerable FreePBX Deployments

Researchers detected a wave of scans seeking the EncystPHP webshell on FreePBX systems, signaling heightened risk for telecom and contact‑center providers that rely on this PBX software.

LiveThreat™ Intelligence · 📅 April 14, 2026· 📰 isc.sans.edu
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
isc.sans.edu

Threat Intel: Scans Target EncystPHP Webshell on Vulnerable FreePBX Deployments

What Happened — Security researchers observed a surge in Internet‑wide scans looking for the “EncystPHP” webshell, a malicious back‑door that attackers have been planting on compromised FreePBX telephony systems. The scans attempt to locate installations that expose the shell with weak or default credentials.

Why It Matters for TPRM

  • Indicates active reconnaissance against a widely‑used PBX platform, raising the likelihood of future compromise of third‑party telecom services.
  • Successful exploitation can give attackers persistent remote access, enabling data exfiltration, call interception, or lateral movement into connected corporate networks.
  • Vendors and service providers that host or integrate FreePBX must verify that their environments are not exposed to this specific webshell.

Who Is Affected — Telecommunications providers, contact‑center SaaS vendors, enterprises running on‑prem FreePBX, and any third‑party MSPs that manage PBX infrastructure.

Recommended Actions

  • Inventory all FreePBX instances and verify they are patched to the latest security releases.
  • Conduct credential hygiene checks; enforce strong, unique passwords for any web‑access interfaces.
  • Deploy web‑application firewalls (WAF) or intrusion detection signatures that flag EncystPHP payloads.
  • Review third‑party contracts for PBX management services and require proof of hardening controls.

Technical Notes — The EncystPHP shell is typically dropped after exploiting known CVEs in FreePBX (e.g., CVE‑2023‑XXXX). Attackers scan for the presence of the shell by probing common URLs and testing default credential sets. No public CVE is tied to the shell itself; the risk stems from vulnerable underlying PBX software and weak authentication. Source: SANS Internet Storm Center – Scans for EncystPHP Webshell

📰 Original Source
https://isc.sans.edu/diary/rss/32892

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.