← Back to BrewedIntel
malwaremediumScanningWebshellEncystPHP

Apr 13, 2026 • SANS Internet Storm Center

Scans for EncystPHP Webshell, (Mon, Apr 13th)

Attackers are actively scanning for the EncystPHP webshell, which is particularly favored for compromising vulnerable FreePBX VoIP systems. Unlike previous...

Source
SANS Internet Storm Center
Category
malware
Severity
medium

Executive Summary

Attackers are actively scanning for the EncystPHP webshell, which is particularly favored for compromising vulnerable FreePBX VoIP systems. Unlike previous opportunistic webshell deployments requiring no authentication, threat actors are now utilizing webshells with stronger, harder-to-guess credentials. The scanning activity suggests ongoing reconnaissance efforts to identify and exploit susceptible systems. Organizations running FreePBX should ensure patches are current, monitor for unauthorized webshell deployments, and implement strong access controls to mitigate risk. The use of advanced webshell credentials indicates a shift toward more sophisticated attack methodologies targeting VoIP infrastructure.

Summary

Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that use well-known credentials. But some attackers are paying attention and are deploying webshells with more difficult-to-guess credentials. Today, I noticed some scans for what appears to be the "EncystPHP" web shell. Fortinet wrote about this webshell back in January. It appears to be a favorite among attackers compromising vulnerable FreePBX systems.

Published Analysis

Attackers are actively scanning for the EncystPHP webshell, which is particularly favored for compromising vulnerable FreePBX VoIP systems. Unlike previous opportunistic webshell deployments requiring no authentication, threat actors are now utilizing webshells with stronger, harder-to-guess credentials. The scanning activity suggests ongoing reconnaissance efforts to identify and exploit susceptible systems. Organizations running FreePBX should ensure patches are current, monitor for unauthorized webshell deployments, and implement strong access controls to mitigate risk. The use of advanced webshell credentials indicates a shift toward more sophisticated attack methodologies targeting VoIP infrastructure. Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that use well-known credentials. But some attackers are paying attention and are deploying webshells with more difficult-to-guess credentials. Today, I noticed some scans for what appears to be the "EncystPHP" web shell. Fortinet wrote about this webshell back in January. It appears to be a favorite among attackers compromising vulnerable FreePBX systems. Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that use well-known credentials. But some attackers are paying attention and are deploying webshells with more difficult-to-guess credentials. Today, I noticed some scans for what appears to be the "EncystPHP" web shell. Fortinet wrote about this webshell back in January. It appears to be a favorite among attackers compromising vulnerable FreePBX systems.

Linked Entities

  • EncystPHP