The initial access obtained using this method was then combined with other steps to potentially gain root-level access on the target hosts, it added.

In light of active exploitation, users are advised to upgrade to the latest supported versions of FreePBX and restrict public access to the administrator control panel. Users are also advised to scan their environments for the following indicators of compromise (IoCs) –

  • File “/etc/freepbx.conf” recently modified or missing
  • Presence of the file “/var/www/html/.clean.sh” (this file should not exist on normal systems)
  • Suspicious POST requests to “modular.php” in Apache web server logs dating back to at least August 21, 2025
  • Phone calls placed to extension 9998 in Asterisk call logs and CDRs are unusual (unless previously configured)
  • Suspicious “ampuser” user in the ampusers database table or other unknown users

“We are seeing active exploitation of FreePBX in the wild with activity traced back as far as August 21 and backdoors being dropped post-compromise,” watchTowr CEO Benjamin Harris said in a statement shared with The Hacker News.

“While it’s early, FreePBX (and other PBX platforms) have long been a favorite hunting ground for ransomware gangs, initial access brokers and fraud groups abusing premium billing. If you use FreePBX with an endpoint module, assume compromise. Disconnect systems immediately. Delays will only increase the blast radius.”

Update#

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added CVE-2025-57819 to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the fixes by September 19, 2025.

“Sangoma FreePBX contains an authentication bypass vulnerability due to insufficiently sanitized user-supplied data allows unauthenticated access to Free PBX Administrator leading to arbitrary database manipulation and remote code execution,” the agency said.

Found this article interesting? Follow us on Google NewsTwitter and LinkedIn to read more exclusive content we post.