Scans for EncystPHP Webshell, (Mon, Apr 13th)
Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that use well-known credentials. But some attackers are paying attention and are deploying webshells with more difficult-to-guess credentials. Today, I noticed some scans for what appears to be the "EncystPHP" web shell. Fortinet wrote about this webshell back in January. It appears to be a favorite among attackers compromising vulnerable FreePBX systems.
AI Analysis
Technical Summary
The EncystPHP webshell is a PHP-based backdoor favored by attackers targeting vulnerable FreePBX systems. It uses a parameter named "md5" in HTTP GET requests to authenticate access, where the parameter value must match a hard-coded secret string in the webshell code. Attackers scan for this webshell by sending requests to specific FreePBX module URLs. Upon successful exploitation, the webshell installs multiple backdoor user accounts with predefined password hashes, enabling persistent unauthorized access. The threat actor IP address identified is from the Netherlands and is also associated with other FreePBX exploit attempts. This webshell was previously documented by Fortinet in January 2026 and continues to be actively scanned for in April 2026.
Potential Impact
Successful exploitation of the EncystPHP webshell on vulnerable FreePBX systems allows attackers to execute arbitrary commands and establish persistent backdoor user accounts. This compromises system integrity and confidentiality by enabling unauthorized remote access and control. The presence of multiple backdoor accounts increases the risk of long-term undetected compromise. There are no confirmed reports of widespread exploitation in the wild beyond scanning activity as of the latest report.
Mitigation Recommendations
No official patch or vendor advisory is provided in the source data. Users of FreePBX should proactively check for the presence of the listed backdoor accounts with the specified password hashes and remove any unauthorized accounts. Additionally, securing FreePBX systems by applying all relevant security updates, disabling unused modules, and restricting access to administrative interfaces is recommended. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance.
Scans for EncystPHP Webshell, (Mon, Apr 13th)
Description
Last week, I wrote about attackers scanning for various webshells, hoping to find some that do not require authentication or others that use well-known credentials. But some attackers are paying attention and are deploying webshells with more difficult-to-guess credentials. Today, I noticed some scans for what appears to be the "EncystPHP" web shell. Fortinet wrote about this webshell back in January. It appears to be a favorite among attackers compromising vulnerable FreePBX systems.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The EncystPHP webshell is a PHP-based backdoor favored by attackers targeting vulnerable FreePBX systems. It uses a parameter named "md5" in HTTP GET requests to authenticate access, where the parameter value must match a hard-coded secret string in the webshell code. Attackers scan for this webshell by sending requests to specific FreePBX module URLs. Upon successful exploitation, the webshell installs multiple backdoor user accounts with predefined password hashes, enabling persistent unauthorized access. The threat actor IP address identified is from the Netherlands and is also associated with other FreePBX exploit attempts. This webshell was previously documented by Fortinet in January 2026 and continues to be actively scanned for in April 2026.
Potential Impact
Successful exploitation of the EncystPHP webshell on vulnerable FreePBX systems allows attackers to execute arbitrary commands and establish persistent backdoor user accounts. This compromises system integrity and confidentiality by enabling unauthorized remote access and control. The presence of multiple backdoor accounts increases the risk of long-term undetected compromise. There are no confirmed reports of widespread exploitation in the wild beyond scanning activity as of the latest report.
Mitigation Recommendations
No official patch or vendor advisory is provided in the source data. Users of FreePBX should proactively check for the presence of the listed backdoor accounts with the specified password hashes and remove any unauthorized accounts. Additionally, securing FreePBX systems by applying all relevant security updates, disabling unused modules, and restricting access to administrative interfaces is recommended. Patch status is not yet confirmed — check the vendor advisory for current remediation guidance.
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32892","fetched":true,"fetchedAt":"2026-04-13T13:16:52.238Z","wordCount":533}
Threat ID: 69dcecc482d89c981fdf6328
Added to database: 4/13/2026, 1:16:52 PM
Last enriched: 4/13/2026, 1:17:02 PM
Last updated: 4/13/2026, 4:35:28 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.