Hackers are compromising VoIP phone system for monetization
Hackers are using outgoing calls made by users for generating profit.
Recent reports submitted by security researchers show that hackers are using one of the most complex yet efficient methods for generating profit. The report shows that hackers have exploited VoIP (voice over Internet Protocol) servers of over 1,200 organizations in 60 countries within the past one year.
Hackers target an open-source user interface dubbed Sangoma PBX, which is used for the management and controlling of Asterisk VoIP phone systems, specifically the Session Initiation Protocol (SIP) servers.
Asterisk is a widely used and popular VoIP PBX (private branch exchange) system used by various organizations for telecommunication. PBX is a switching system used to establish and control phone calls between telecommunication endpoints using VoIP servers.
Hackers are exploiting a critical vulnerability that allows them to gain admin access to the system. The campaign begins with scanning, proceeds to exploit the vulnerability, and then culminates into web shell installation.
Gaining admin access to these systems and servers can allow hackers to fulfill their malicious intentions. Hackers have used a PHP web shell to gain control of PBX system that allows them to make phone calls from any connected system.
NPAV recommends users and organizations to always keep a proper check on their cybersecurity measures. Keeping them updated and tested for proper working will ensure security and safety.
Install NPAV on your devices to keep them protected from all kinds of cyberattacks. Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)