An analysis of more than 500,000 malware samples obtained by threat analysts over a period of three months has revealed an extensive campaign targeting Elastix VoIP telephony servers. At the same time, the threat actors are doing this in an effort to steal sensitive data from them.
In FreePBX, the Digium phones module is integrated with Elastix, server software that handles unified communications. CVE-2021-45461 is an RCE vulnerability that the attackers may have exploited in order to execute code remotely.
It appears that the recent campaign is linked to the vulnerability that has been exploited since December 2021 by threat actors.
Apparently, one of the attackers’ goals, according to a Palo Alto Networks security researcher at Unit 42, was to install a PHP web shell on a user’s machine. A compromise of a communications server may result in the execution of arbitrary commands.
In the period between December 2021 and March 2022, over 500,000 samples of malware within the family have been deployed by the threat actor. There are several similarities between this campaign and an operation that took place in 2020, which is still active today.
Here below we have mentioned the Modus Operandi:-
In an effort to drop a small shell script, two attack groups were observed to use different initial exploitation scripts in order to accomplish their goal.
Through the use of the script, the PHP backdoor is installed on the target device, along with the creation of root user accounts and a scheduled task to ensure persistence.
The PHP backdoor file installed by this dropper is also spoofed by spoofing the timestamp of the file in an attempt to blend into the existing environment.
There is a link between several Russian adult sites and the IP addresses of the attackers from both groups, whereas DNS records suggest that many of the sites are actually located in the Netherlands.
By using the cmd request parameter, the malware supports both commands:-
There are also a number of built-in commands that come with the web shell that can be used for reading files, listing directories, and finding out about the Asterisk open source PBX platform, which is also included in the shell.
As an established operation, this is a phenomenon that might occur from time to time. Making phone calls with IPRN allows you to make money while you make telephone calls, and vice versa, by connecting the two.
In other words, these systems can be used to launch further attacks from which the attacker can take advantage.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.
Along with the release of Kali Linux 2025.3, a major update introduces an innovative tool that…
ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…
Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…
Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…
Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…
Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…