INJ3CTOR3 JOMANGY Webshell Threatens FreePBX Security

INJ3CTOR3 targets FreePBX with persistent JOMANGY webshell for toll fraud

INJ3CTOR3 JOMANGY Webshell Threatens FreePBX Security

INJ3CTOR3 JOMANGY webshell attacks have emerged as a significant threat to organisations using FreePBX. In the latest campaign, attackers compromise telephony servers to generate fraudulent outbound calls and establish persistent backdoor access. Understanding the risks posed by INJ3CTOR3 and JOMANGY is vital for organisations relying on FreePBX for business communications.

How the INJ3CTOR3 Campaign Targets FreePBX

Advanced Compromise Techniques

Researchers at Cyble Research & Intelligence Labs have linked a sophisticated cyber campaign to the threat actor INJ3CTOR3. Unlike typical ransomware or data theft operations, this campaign focuses on hijacking FreePBX systems to abuse SIP trunks, enabling attackers to make fraudulent outbound calls. These calls can incur direct financial losses for affected organisations and disrupt critical business communications.

JOMANGY Webshell Deployment

The attackers introduce a new PHP webshell family called JOMANGY, alongside the ZenharR malware toolkit. JOMANGY enables remote control of compromised servers, allowing threat actors to execute commands, create accounts, and maintain access. This webshell is distributed in multiple locations on the server, making it difficult to remove all traces during remediation attempts.

Self-Healing Persistence Architecture

INJ3CTOR3 employs a multi-stage Bash infection chain designed to create a robust, self-healing persistence framework. The operation installs six distinct persistence mechanisms, each reinforcing the others. These mechanisms include:

  • Cron-based command-and-control polling every one to three minutes
  • Shell profile injections activated during reboots and root logins
  • Immutable crontab backups protected using chattr +i
  • Watchdog processes that relaunch malware components automatically
  • Multiple immutable JOMANGY webshell copies scattered across the server
  • A self-reinstalling PHP executor embedded in the environment

This approach means that even partial remediation (such as removing a few malicious files or cron jobs) is often ineffective. Any surviving component can quickly restore the full infection within minutes, making cleanup challenging for administrators.

Backdoor Account Creation and Privilege Escalation

Extensive Backdoor Deployment

The campaign also establishes 18 separate backdoor accounts on compromised FreePBX systems. Nine accounts have UID-0 privileges, granting root access, while eight accounts mimic legitimate service users such as “asterisk,” “freepbxuser,” “spamfilter,” and “sangoma.” One account is inserted directly into the FreePBX MySQL database, providing administrative access to the web panel.

These accounts are strategically named to blend into ordinary PBX administrative environments, reducing the likelihood of detection during routine inspections. This extensive access allows attackers to maintain control, escalate privileges, and potentially pivot to other systems within the network.

Why INJ3CTOR3 JOMANGY Webshell Attacks Matter

Financial and Operational Impact

Organisations running Asterisk/FreePBX face significant financial and operational risks from these attacks. Fraudulent calls generated through compromised SIP trunks can result in substantial unauthorised charges. The disruption of telephony services can affect customer support, sales, and internal communications, harming business continuity.

Persistent and Stealthy Threats

The self-healing nature of the malware ecosystem means infections are resilient to standard remediation efforts. Attackers can regain access rapidly, making it difficult for IT teams to restore systems to a secure state. The stealthy deployment of backdoor accounts further complicates detection, especially when malicious users mimic legitimate service accounts.

Potential for Broader Network Compromise

Root-level access and administrative control over telephony infrastructure can provide a foothold for lateral movement within the organisation’s network. Attackers may explore opportunities for additional compromise, data theft, or further disruptions, increasing the stakes for affected organisations.

Recommended Actions for Organisations

Immediate Response Steps

  • Conduct a thorough audit of all user accounts on FreePBX servers, focusing on unexpected or suspicious entries.
  • Review and clean all cron jobs, shell profiles, and scheduled tasks for signs of malicious persistence mechanisms.
  • Check for immutable files (using chattr +i) and remove or restore permissions as needed.
  • Inspect the FreePBX MySQL database for unauthorised administrative accounts.
  • Search for multiple copies of PHP webshells (like JOMANGY) scattered across the server.

Ongoing Security Practices

  • Apply latest security updates and patches to FreePBX and underlying operating systems.
  • Restrict access to SIP trunks and administrative panels using strong authentication and network segmentation.
  • Implement regular monitoring and logging of telephony activity to detect unusual outbound calls.
  • Use file integrity monitoring tools to spot changes to critical system files and configurations.
  • Educate IT staff about current attack techniques and the importance of multi-layered defence.

Incident Recovery and Prevention

If signs of compromise are detected, organisations should consider rebuilding affected systems from trusted backups. Change all passwords and rotate authentication credentials. Engage with cybersecurity professionals to conduct forensic investigations and ensure all persistence mechanisms are eradicated. Proactive vulnerability assessments and penetration testing can help identify weaknesses before attackers exploit them.

Organisations using FreePBX should remain vigilant, as INJ3CTOR3 JOMANGY webshell attacks demonstrate the evolving sophistication of threats targeting critical business infrastructure.

Originally reported by thecyberexpress.com.

Share this bulletin

About the Author

Rob McBride Headshot - CyPro Partner and leading cyber security expert

Rob McBride

Partner

Rob McBride

Rob is a Founding Partner at CyPro and a highly experienced CISO. Beginning his career with a successful tenure at Deloitte, Rob has since amassed a wealth of experience, notably serving as a cyber security advisor to the UK government and spearheading cloud security transformations for several global banks.

At CyPro, Rob leads the managed service business line, working extensively across multiple sectors including telecommunications, technology, higher education, travel, and retail. He is passionate about equipping small and medium-sized businesses (SMBs) with robust cyber security strategies to fuel their growth.

View Profile
Back to Bulletins
Category
Published
May 22 - 2026
Post Tags
Cypro firewall showing robust network security
Secure your business.
Elevate your security, accelerate your growth. We take care of cyber security for high-growth companies, at every stage of their journey.
Get in touch

Related News

CyPro Cookie Consent

Hmmm cookies...

Our delicious cookies make your experience smooth and secure.

Privacy PolicyOkay, got it!

We use cookies to enhance your experience, analyse site traffic, and for marketing purposes. For more information on how we handle your personal data, please see our Privacy Policy.

Schedule a Call