So, my initial review of the Yaelink SIP-T42S before I have the in hand:
- The documentation exists, but can be a pain in the ass to track down exactly what you need.
- Looks like I've got everything already setup to serve the boot configurations and should work with my FreePBX installation. I'll probably get these setup as backups in case I lose a couple of Digium D40 phones during the competition.
- Firmware is still available for the phone, but it is EoL.
- English isn't the greatest in the documentation, but it gets the job done.
- Cheap as hell as I bought 15 of these for $34 which is absolutely insane.

#voip #yaelink #freepbx

How to Install FreePBX 17 on Ubuntu 24.04

This article outlines the installation of FreePBX 17 on Ubuntu 24.04 to manage an Asterisk 22 PBX system. It details necessary steps including installing Asterisk, Apache, MariaDB, PHP, and Node.js, followed by FreePBX installation. Proper configurations ensure seamless integration, leading to a fully functional Asterisk-based phone system.

https://geekrewind.com/how-to-install-freepbx-17-on-ubuntu-24-04/

Now the other two are ported - all the #analogue #trunks are ceased and all traffic to and from the #PSTN from this #PBX is now #VOIP (using #PJSIP trunks on #FreePBX )

I disconnected all the analogue lines as #Openreach leave battery on them, that way they show as RED alarm on #Asterisk and won't be selected for any calls (worst case is they return a busy trunk status and the route will go to the next trunk, but I've taken away all the analogue circuits from every PSTN route)

#Telecoms #Telephony

It's been a busy 24 hours in the cyber world with significant updates on recent breaches, new malware and APT activity, critical vulnerabilities, and shifts in the threat landscape. Let's dive in:

Recent Cyber Attacks and Breaches ⚠️

- Dutch telco Odido is facing a second wave of leaks from ShinyHunters, who claim to have stolen 21 million records. The latest leak added another 1 million records, including bank account numbers, PII, passport numbers, and driving licenses. Odido, backed by Dutch police, is refusing to pay the ransom, advising other organisations to do the same.
- French online marketplace ManoMano confirmed a data breach via a compromised customer support subcontractor (unconfirmed reports suggest Zendesk), exposing names, emails, phone numbers, and customer service exchanges. An actor named "Indra" on BreachForums claims responsibility for 37.8 million user accounts across multiple European markets.
- Europol's "Project Compass" has made significant strides against "The Com," a network of thousands of minors and young adults involved in cybercrime, violence, and extortion. The operation, supported by 28 countries, has led to 30 arrests and the identification of 179 perpetrators, with The Com previously linked to high-profile attacks against Marks & Spencer, Harrods, and Las Vegas casinos.
- Meta is taking legal action against deceptive advertisers in Brazil, China, and Vietnam for "celeb-bait" scams and cloaking techniques, which misuse celebrity images for fraudulent healthcare products, fake investments, and subscription fraud. This highlights the industrial scale of scam operations, often originating from China and Hong Kong, and the rise of "pig butchering-as-a-service."
- Fintech company Marquis is suing its firewall vendor, SonicWall, for damages following a ransomware attack that impacted over 780,000 people. Marquis alleges the breach was a direct result of SonicWall's own compromise, where customer firewall configuration backups were stolen, raising critical questions about vendor liability in third-party breaches.
- A former US Air Force officer, Gerald Eddie Brown, has been arrested for conspiring with a convicted Chinese hacker, Stephen Su Bin, to provide combat aircraft training to Chinese military pilots. This highlights ongoing efforts by foreign adversaries to exploit the expertise of former US military personnel, violating International Traffic in Arms Regulations.
- Yurii Nazarenko, a Ukrainian man, pleaded guilty to operating OnlyFake, an AI-powered website that generated and sold over 10,000 fake identification documents, including passports and driving licenses for 50+ countries. These fake IDs were primarily used to bypass Know Your Customer (KYC) verification at banks and cryptocurrency exchanges, with Nazarenko agreeing to forfeit $1.2 million.

πŸ•΅πŸΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/27/odido_shinyhunters_leaks/
πŸ•΅πŸΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/27/manomano_breach/
🀫 CyberScoop | https://cyberscoop.com/project-compass-the-com-europol/
πŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/police-crackdown-on-the-com-cybercrime-gang-leads-to-30-arrests/
πŸ“° The Hacker News | https://thehackernews.com/2026/02/meta-files-lawsuits-against-brazil.html
⚫ Dark Reading | https://www.darkreading.com/cloud-security/marquis-sonicwall-lawsuit-breach-blame-game
πŸ—žοΈ The Record | https://therecord.media/former-air-force-officer-arrested-for-working-with-hacker-flight-training-china
πŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/ukrainian-man-pleads-guilty-to-running-ai-powered-fake-id-site/

New Threat Research on Threat Actors, Malware, and Tradecraft πŸ›‘οΈ

- North Korean APT ScarCruft (APT37) is employing a new toolkit in its "Ruby Jumper" campaign to breach air-gapped networks. This includes a backdoor (RESTLEAF) using Zoho WorkDrive for C2 and USB-based malware (THUMBSBD, VIRUSTASK) that turns removable media into a covert C2 relay for data exfiltration and command delivery. Other tools like FOOTWINE provide keylogging and audio/video capture.
- Cisco Talos has identified a new backdoor, "Dohdoor," used by a group tracked as UAT-10027 (with low confidence linked to North Korea's Lazarus Group) targeting US healthcare and education sectors. The multi-stage infection uses social engineering, PowerShell downloaders, DLL sideloading, Cloudflare DNS-over-HTTPS for C2, process hollowing, and EDR bypass techniques by unhooking system calls in ntdll.dll.
- Threat actors are distributing a Java-based Remote Access Trojan (RAT) via trojanised gaming utilities spread through browsers and chat platforms. The attack chain uses PowerShell and LOLBins (cmstp.exe) for stealth, deletes initial downloaders, and configures Microsoft Defender exclusions. Persistence is achieved via scheduled tasks and startup scripts.
- Chainalysis' 2026 Crypto Crime Report reveals that while ransomware payments decreased by 8% in 2025 to $820 million, and the percentage of victims paying dropped to 28%, the number of claimed ransomware attacks surged by 50% year-over-year. The median ransom demand also jumped significantly to $59,556, indicating a shift towards more frequent, smaller-scale attacks and a thriving market for Initial Access Brokers (IABs).

πŸ“° The Hacker News | https://thehackernews.com/2026/02/scarcruft-uses-zoho-workdrive-and-usb.html
πŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/
πŸ•΅πŸΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/27/suspected_nork_digital_intruders_caught/
πŸ“° The Hacker News | https://thehackernews.com/2026/02/trojanized-gaming-tools-spread-java.html
πŸ•΅πŸΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/27/ransomware_chainalysis/

Vulnerabilities Under Active Exploitation 🚨

- CISA has issued an updated warning about RESURGE, a malicious implant found on Ivanti Connect Secure devices, which can remain dormant and undetected after zero-day exploitation of CVE-2025-0282. RESURGE is a passive C2 implant that uses sophisticated network-level evasion, hooking the `accept()` function to inspect TLS packets for a specific CRC32 fingerprint and employing a fake Ivanti certificate for authentication.
- Over 900 Sangoma FreePBX instances remain infected with web shells following attacks exploiting CVE-2025-64328 (CVSS 8.6), a post-authentication command injection vulnerability. This flaw allows attackers to execute arbitrary shell commands as the 'asterisk' user. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, with the INJ3CTOR3 threat actor actively leveraging it to deploy the EncystPHP web shell.

πŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/
πŸ“° The Hacker News | https://thehackernews.com/2026/02/900-sangoma-freepbx-instances.html

Threat Landscape Commentary 🌍

- With the FIFA World Cup 2026 approaching, cybersecurity experts are warning host cities about rising risks from drones and wireless surveillance. Major events create complex radio-frequency environments, making them prime targets for threat actors to hijack/jam C2 signals, compromise OT systems via wireless, and conduct surveillance using drones. Effective defence requires layered detection (RF, radar, acoustic, optical) and trained personnel.
- Anthropic's new Claude Code Security, an AI coding tool designed to scan for vulnerabilities and suggest fixes, has generated significant market reaction. While it shows promise in identifying complex bugs and generating patches, it's still early days, with issues like false positives and the importance of securing the AI tools themselves being highlighted. It's not yet a comprehensive application security solution, and ongoing scanning costs could be a factor.

⚫ Dark Reading | https://www.darkreading.com/mobile-security/cities-major-events-wireless-drone-defense
⚫ Dark Reading | https://www.darkreading.com/application-security/claude-code-security-shows-promise-not-perfection

Data Privacy πŸ”’

- Samsung has agreed to update its Automated Content Recognition (ACR) privacy practices after a lawsuit from the Texas Attorney General, Ken Paxton. Samsung will now implement clear and conspicuous disclosure and consent screens on its smart TVs before collecting and processing ACR viewing data, which captures real-time viewing habits for advertisers. Lawsuits against other smart TV manufacturers (Sony, LG, Hisense, TCL) are ongoing.

πŸ—žοΈ The Record | https://therecord.media/samsung-updates-acr-privacy-practices-texas

Government Staffing and Program Changes πŸ›οΈ

- Senator Ron Wyden has pledged to block the confirmation of Lt. Gen. Joshua Rudd as the new head of both U.S. Cyber Command and the National Security Agency. Wyden cited Rudd's lack of digital warfare and intelligence experience, as well as vague answers regarding NSA's surveillance authorities, stating that the urgent threat landscape leaves no room for "on-the-job learning."
- Madhu Gottumukkala has been replaced by Nick Andersen as the acting director of the Cybersecurity and Infrastructure Security Agency (CISA). Gottumukkala's departure follows widespread dismay and criticism regarding CISA's performance during the first year of the Trump administration, while Andersen has received more favourable reviews from industry professionals.

πŸ—žοΈ The Record | https://therecord.media/wyden-blocks-rudd-confirmation-nsa-cyber-command
🀫 CyberScoop | https://cyberscoop.com/cisa-leadership-change-madhu-gottumukkala-nick-andersen/

#CyberSecurity #ThreatIntelligence #Ransomware #APT #Malware #Vulnerability #ZeroDay #Ivanti #FreePBX #DataBreach #Privacy #AI #Drones #Cybercrime #InfoSec #IncidentResponse

Cops back Dutch telco Odido after second wave of ShinyHunters leaks

: Company refuses to pay ransom as attackers threaten larger daily dumps

The Register

Finished writing the docs for my FreePBX-17-Container Repository.

Took around an hour, felt like an eternity.

Hope they help folks understand the ~magic~ behind it better.

Repo can be found here: https://codeberg.org/Spoljarevic/FreePBX-17-Container/

#docs #documentation #wiki #freepbx #freepbx17 #container #containerization #docker #dockercompose

FreePBX-17-Container

Full FreePBX 17 containerized setup I ordered from a DevOps on Fiverr. It is currently only tested with Docker, but should work with Podman too is set up right.

Codeberg.org

Just over a month and I've tamed all the #trunks (with abundant snake heads at the end), made sure 1500+ #blighters are yeeted (with more trying every day) got inter #PBX #trunk working between on-premises and cloud #FreePBX - just waiting for porting of first analogue number to check this (and CLID presentation) works and then main office one can follow.

Took many late evenings, a lot of research of everything from old #BritishTelecom training manuals to some from Universities in India and the Indian telecom companies, and I've learned a lot more about #SIP even since 2008 when I built the first #VOIP #PBX used at work.

Thankfully #routers seem to handle #SIP over #NAT a lot better than they used to (even got an extension it working over #LTE with #Linphone)

#Telephony #Asterisk

As an experiment, I asked #MS365 #Copilot to explain how to set up #SIP trunk on #FreePBX using #PJSIP (consider that I have already successfully set up several of these, to external providers and an inter-PBX line between two servers).

Results it returned were horribly mangled and mixed up from various providers sites, if you followed them the trunk likely won't work at all, and even if it did it would end up in completely wrong context/dialplan.

It didn't mention such things as fromuser and took a few prompts to point out potential firewall issues.

You need to know (or learn) the basics of #telephony before starting, or else it will all go tits up very quickly - #AI is still no substitute for "boots on the ground" who have put in research for what they are trying to achieve..

After hours and hours to understand how they work and trying to find some information online, I finally figured out how to use an ATA190 with #FreePBX and #asterisk !

Basically, you need to send an XML file with TFTP. I will publish an article about it :D

#FreePBX is a popular open-source IP PBX management tool. @FreePBX manages #VoIP communications & requires high availability & relatively open access, making it a very attractive target for threat actors. It now has serious CVE vulns. HT @PicusSecurity https://cybersec.picussecurity.com/s/critical-freepbx-vulnerabilities-cve-2025-66039-cve-2025-61675-cve-2025-61675-25485
Critical FreePBX Vulnerabilities: CVE-2025-66039, CVE-2025-61675, CVE-2025-61675

Discover critical FreePBX flaws CVE-2025-66039 & CVE-2025-61678. Learn how auth bypass and RCE vulnerabilities expose VoIP networks.

Building new #FreePBX #Asterisk #VOIP server (about 10 years since I built the last one) was also an eye-opener of how much #tech world seems to have been deskilled with the rush to #cloud (even before AI) - it seems fewer folk want to build a server from bare metal or even VPS and are flocking to proprietary cloud #PBX (that nearly all run Asterisk under the hood anyway), it might be that #telephony is "uncool" but also remaining engineers have simply stopped helping one another, perhaps not wanting to aid the competition?

I didn't even get much AI slop when searching for info on community forums, as there is so little there and many unanswered threads..