Now the other two are ported - all the #analogue #trunks are ceased and all traffic to and from the #PSTN from this #PBX is now #VOIP (using #PJSIP trunks on #FreePBX )

I disconnected all the analogue lines as #Openreach leave battery on them, that way they show as RED alarm on #Asterisk and won't be selected for any calls (worst case is they return a busy trunk status and the route will go to the next trunk, but I've taken away all the analogue circuits from every PSTN route)

#Telecoms #Telephony

It's been a busy 24 hours in the cyber world with significant updates on recent breaches, new malware and APT activity, critical vulnerabilities, and shifts in the threat landscape. Let's dive in:

Recent Cyber Attacks and Breaches โš ๏ธ

- Dutch telco Odido is facing a second wave of leaks from ShinyHunters, who claim to have stolen 21 million records. The latest leak added another 1 million records, including bank account numbers, PII, passport numbers, and driving licenses. Odido, backed by Dutch police, is refusing to pay the ransom, advising other organisations to do the same.
- French online marketplace ManoMano confirmed a data breach via a compromised customer support subcontractor (unconfirmed reports suggest Zendesk), exposing names, emails, phone numbers, and customer service exchanges. An actor named "Indra" on BreachForums claims responsibility for 37.8 million user accounts across multiple European markets.
- Europol's "Project Compass" has made significant strides against "The Com," a network of thousands of minors and young adults involved in cybercrime, violence, and extortion. The operation, supported by 28 countries, has led to 30 arrests and the identification of 179 perpetrators, with The Com previously linked to high-profile attacks against Marks & Spencer, Harrods, and Las Vegas casinos.
- Meta is taking legal action against deceptive advertisers in Brazil, China, and Vietnam for "celeb-bait" scams and cloaking techniques, which misuse celebrity images for fraudulent healthcare products, fake investments, and subscription fraud. This highlights the industrial scale of scam operations, often originating from China and Hong Kong, and the rise of "pig butchering-as-a-service."
- Fintech company Marquis is suing its firewall vendor, SonicWall, for damages following a ransomware attack that impacted over 780,000 people. Marquis alleges the breach was a direct result of SonicWall's own compromise, where customer firewall configuration backups were stolen, raising critical questions about vendor liability in third-party breaches.
- A former US Air Force officer, Gerald Eddie Brown, has been arrested for conspiring with a convicted Chinese hacker, Stephen Su Bin, to provide combat aircraft training to Chinese military pilots. This highlights ongoing efforts by foreign adversaries to exploit the expertise of former US military personnel, violating International Traffic in Arms Regulations.
- Yurii Nazarenko, a Ukrainian man, pleaded guilty to operating OnlyFake, an AI-powered website that generated and sold over 10,000 fake identification documents, including passports and driving licenses for 50+ countries. These fake IDs were primarily used to bypass Know Your Customer (KYC) verification at banks and cryptocurrency exchanges, with Nazarenko agreeing to forfeit $1.2 million.

๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/27/odido_shinyhunters_leaks/
๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/27/manomano_breach/
๐Ÿคซ CyberScoop | https://cyberscoop.com/project-compass-the-com-europol/
๐Ÿค– Bleeping Computer | https://www.bleepingcomputer.com/news/security/police-crackdown-on-the-com-cybercrime-gang-leads-to-30-arrests/
๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/02/meta-files-lawsuits-against-brazil.html
โšซ Dark Reading | https://www.darkreading.com/cloud-security/marquis-sonicwall-lawsuit-breach-blame-game
๐Ÿ—ž๏ธ The Record | https://therecord.media/former-air-force-officer-arrested-for-working-with-hacker-flight-training-china
๐Ÿค– Bleeping Computer | https://www.bleepingcomputer.com/news/security/ukrainian-man-pleads-guilty-to-running-ai-powered-fake-id-site/

New Threat Research on Threat Actors, Malware, and Tradecraft ๐Ÿ›ก๏ธ

- North Korean APT ScarCruft (APT37) is employing a new toolkit in its "Ruby Jumper" campaign to breach air-gapped networks. This includes a backdoor (RESTLEAF) using Zoho WorkDrive for C2 and USB-based malware (THUMBSBD, VIRUSTASK) that turns removable media into a covert C2 relay for data exfiltration and command delivery. Other tools like FOOTWINE provide keylogging and audio/video capture.
- Cisco Talos has identified a new backdoor, "Dohdoor," used by a group tracked as UAT-10027 (with low confidence linked to North Korea's Lazarus Group) targeting US healthcare and education sectors. The multi-stage infection uses social engineering, PowerShell downloaders, DLL sideloading, Cloudflare DNS-over-HTTPS for C2, process hollowing, and EDR bypass techniques by unhooking system calls in ntdll.dll.
- Threat actors are distributing a Java-based Remote Access Trojan (RAT) via trojanised gaming utilities spread through browsers and chat platforms. The attack chain uses PowerShell and LOLBins (cmstp.exe) for stealth, deletes initial downloaders, and configures Microsoft Defender exclusions. Persistence is achieved via scheduled tasks and startup scripts.
- Chainalysis' 2026 Crypto Crime Report reveals that while ransomware payments decreased by 8% in 2025 to $820 million, and the percentage of victims paying dropped to 28%, the number of claimed ransomware attacks surged by 50% year-over-year. The median ransom demand also jumped significantly to $59,556, indicating a shift towards more frequent, smaller-scale attacks and a thriving market for Initial Access Brokers (IABs).

๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/02/scarcruft-uses-zoho-workdrive-and-usb.html
๐Ÿค– Bleeping Computer | https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/
๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/27/suspected_nork_digital_intruders_caught/
๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/02/trojanized-gaming-tools-spread-java.html
๐Ÿ•ต๐Ÿผ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/27/ransomware_chainalysis/

Vulnerabilities Under Active Exploitation ๐Ÿšจ

- CISA has issued an updated warning about RESURGE, a malicious implant found on Ivanti Connect Secure devices, which can remain dormant and undetected after zero-day exploitation of CVE-2025-0282. RESURGE is a passive C2 implant that uses sophisticated network-level evasion, hooking the `accept()` function to inspect TLS packets for a specific CRC32 fingerprint and employing a fake Ivanti certificate for authentication.
- Over 900 Sangoma FreePBX instances remain infected with web shells following attacks exploiting CVE-2025-64328 (CVSS 8.6), a post-authentication command injection vulnerability. This flaw allows attackers to execute arbitrary shell commands as the 'asterisk' user. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, with the INJ3CTOR3 threat actor actively leveraging it to deploy the EncystPHP web shell.

๐Ÿค– Bleeping Computer | https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/
๐Ÿ“ฐ The Hacker News | https://thehackernews.com/2026/02/900-sangoma-freepbx-instances.html

Threat Landscape Commentary ๐ŸŒ

- With the FIFA World Cup 2026 approaching, cybersecurity experts are warning host cities about rising risks from drones and wireless surveillance. Major events create complex radio-frequency environments, making them prime targets for threat actors to hijack/jam C2 signals, compromise OT systems via wireless, and conduct surveillance using drones. Effective defence requires layered detection (RF, radar, acoustic, optical) and trained personnel.
- Anthropic's new Claude Code Security, an AI coding tool designed to scan for vulnerabilities and suggest fixes, has generated significant market reaction. While it shows promise in identifying complex bugs and generating patches, it's still early days, with issues like false positives and the importance of securing the AI tools themselves being highlighted. It's not yet a comprehensive application security solution, and ongoing scanning costs could be a factor.

โšซ Dark Reading | https://www.darkreading.com/mobile-security/cities-major-events-wireless-drone-defense
โšซ Dark Reading | https://www.darkreading.com/application-security/claude-code-security-shows-promise-not-perfection

Data Privacy ๐Ÿ”’

- Samsung has agreed to update its Automated Content Recognition (ACR) privacy practices after a lawsuit from the Texas Attorney General, Ken Paxton. Samsung will now implement clear and conspicuous disclosure and consent screens on its smart TVs before collecting and processing ACR viewing data, which captures real-time viewing habits for advertisers. Lawsuits against other smart TV manufacturers (Sony, LG, Hisense, TCL) are ongoing.

๐Ÿ—ž๏ธ The Record | https://therecord.media/samsung-updates-acr-privacy-practices-texas

Government Staffing and Program Changes ๐Ÿ›๏ธ

- Senator Ron Wyden has pledged to block the confirmation of Lt. Gen. Joshua Rudd as the new head of both U.S. Cyber Command and the National Security Agency. Wyden cited Rudd's lack of digital warfare and intelligence experience, as well as vague answers regarding NSA's surveillance authorities, stating that the urgent threat landscape leaves no room for "on-the-job learning."
- Madhu Gottumukkala has been replaced by Nick Andersen as the acting director of the Cybersecurity and Infrastructure Security Agency (CISA). Gottumukkala's departure follows widespread dismay and criticism regarding CISA's performance during the first year of the Trump administration, while Andersen has received more favourable reviews from industry professionals.

๐Ÿ—ž๏ธ The Record | https://therecord.media/wyden-blocks-rudd-confirmation-nsa-cyber-command
๐Ÿคซ CyberScoop | https://cyberscoop.com/cisa-leadership-change-madhu-gottumukkala-nick-andersen/

#CyberSecurity #ThreatIntelligence #Ransomware #APT #Malware #Vulnerability #ZeroDay #Ivanti #FreePBX #DataBreach #Privacy #AI #Drones #Cybercrime #InfoSec #IncidentResponse

Cops back Dutch telco Odido after second wave of ShinyHunters leaks

: Company refuses to pay ransom as attackers threaten larger daily dumps

The Register

Finished writing the docs for my FreePBX-17-Container Repository.

Took around an hour, felt like an eternity.

Hope they help folks understand the ~magic~ behind it better.

Repo can be found here: https://codeberg.org/Spoljarevic/FreePBX-17-Container/

#docs #documentation #wiki #freepbx #freepbx17 #container #containerization #docker #dockercompose

FreePBX-17-Container

Full FreePBX 17 containerized setup I ordered from a DevOps on Fiverr. It is currently only tested with Docker, but should work with Podman too is set up right.

Codeberg.org

Just over a month and I've tamed all the #trunks (with abundant snake heads at the end), made sure 1500+ #blighters are yeeted (with more trying every day) got inter #PBX #trunk working between on-premises and cloud #FreePBX - just waiting for porting of first analogue number to check this (and CLID presentation) works and then main office one can follow.

Took many late evenings, a lot of research of everything from old #BritishTelecom training manuals to some from Universities in India and the Indian telecom companies, and I've learned a lot more about #SIP even since 2008 when I built the first #VOIP #PBX used at work.

Thankfully #routers seem to handle #SIP over #NAT a lot better than they used to (even got an extension it working over #LTE with #Linphone)

#Telephony #Asterisk

As an experiment, I asked #MS365 #Copilot to explain how to set up #SIP trunk on #FreePBX using #PJSIP (consider that I have already successfully set up several of these, to external providers and an inter-PBX line between two servers).

Results it returned were horribly mangled and mixed up from various providers sites, if you followed them the trunk likely won't work at all, and even if it did it would end up in completely wrong context/dialplan.

It didn't mention such things as fromuser and took a few prompts to point out potential firewall issues.

You need to know (or learn) the basics of #telephony before starting, or else it will all go tits up very quickly - #AI is still no substitute for "boots on the ground" who have put in research for what they are trying to achieve..

After hours and hours to understand how they work and trying to find some information online, I finally figured out how to use an ATA190 with #FreePBX and #asterisk !

Basically, you need to send an XML file with TFTP. I will publish an article about it :D

#FreePBX is a popular open-source IP PBX management tool. @FreePBX manages #VoIP communications & requires high availability & relatively open access, making it a very attractive target for threat actors. It now has serious CVE vulns. HT @PicusSecurity https://cybersec.picussecurity.com/s/critical-freepbx-vulnerabilities-cve-2025-66039-cve-2025-61675-cve-2025-61675-25485
Critical FreePBX Vulnerabilities: CVE-2025-66039, CVE-2025-61675, CVE-2025-61675

Discover critical FreePBX flaws CVE-2025-66039 & CVE-2025-61678. Learn how auth bypass and RCE vulnerabilities expose VoIP networks.

Building new #FreePBX #Asterisk #VOIP server (about 10 years since I built the last one) was also an eye-opener of how much #tech world seems to have been deskilled with the rush to #cloud (even before AI) - it seems fewer folk want to build a server from bare metal or even VPS and are flocking to proprietary cloud #PBX (that nearly all run Asterisk under the hood anyway), it might be that #telephony is "uncool" but also remaining engineers have simply stopped helping one another, perhaps not wanting to aid the competition?

I didn't even get much AI slop when searching for info on community forums, as there is so little there and many unanswered threads..

#Telephone set #BritishTelecom 8746 now with replaced 21A microphone insert, working correctly with #Grandstream #HT802 v2 ATA linked to #FreePBX I built on cloud VPS - accepts both #MF (tone) and #LoopDisconnect #dialling (although dialling a full UK mobile number is quite a long process and I had to make sure the timer was at least 4 seconds (or the digits get sent to register before you've dialled any 0 and call fails due to wrong number being sent to #PBX !)

Ring voltage (set to 55V RMS) is strong enough to ring the 4k bell in 8746

So currently this corner of the office looks like its back in 1980s ๐Ÿ˜

#VOIP #Telephony

configuring #VPS that I'd had dormant for a while (was being used for experimental stuff) as proof of concept for #Cloud #VOIP #PBX using #FreePBX and #Asterisk with #Debian12 and the #Sangoma install script.

TIL: to get #PostFix to work correctly with #IONOS without paying for the commercial System Admin module you *must* install

>apt install libsasl2-modules

or else the emails get knocked back with message "no worthy mechs found" which sounds like some kind of robot battle ๐Ÿ˜ ๐Ÿค–

also added a swapfile (VPS doesn't have one normally), knocked off the commercial modules (which I don't use) and managed to get a couple of eztensions and routes working (after some false starts as I'm using an unusual config linking to another virtual #pbx)

https://sangomakb.atlassian.net/wiki/spaces/PP/pages/73990871/PBX+Platforms+-+Setup+Postfix+Manually