Hello everyone,
FreePBX 15.0.17.67. It has been compromised. Few days ago we had a warning that Freepbx Framework is tampered. We reinstalled the framework and refreshed the signatures thinking it was to do with module update. Last night we had a raft of calls made from our pbx from the wait application. We have the ssh port bound to only a single static IP and no guest or anonymous access enabled. Last SSH login attempts only show our IP addresses.
Blockquote
calldate,clid,src,dst,dcontext,channel,dstchannel,lastapp,lastdata,duration,billsec,disposition,amaflags,accountcode,uniqueid,userfield,did,cnum,cnam,outbound_cnum,outbound_cnam,dst_cnam,recordingfile,linkedid,peeraccount,sequence
“2022-01-23 02:58:42”,""""" <00261326783406>",00261326783406,00261326783406,asterisk-outcalls,Local/[email protected];1,Wait,1900,29,27,ANSWERED,3,1642906722.226079,1642906722.226079,272457
“2022-01-23 02:58:39”,""""" <00261326783407>",00261326783407,00261326783407,asterisk-outcalls,Local/[email protected];1,Wait,1900,29,27,ANSWERED,3,1642906719.226074,1642906719.226074,272450
“2022-01-23 02:58:05”,""""" <00261326783408>",00261326783408,00261326783408,asterisk-outcalls,Local/[email protected];1,Wait,1900,30,27,ANSWERED,3,1642906685.226001,1642906685.226001,272328
…
“2022-01-23 02:56:47”,""""" <00261326783400>",00261326783400,00261326783400,asterisk-outcalls,Local/[email protected];1,Wait,1900,37,27,ANSWERED,3,1642906607.225837,1642906607.225837,272060
“2022-01-23 02:55:42”,""""" <0025772337768>",0025772337768,0025772337768,asterisk-outcalls,Local/[email protected];1,Wait,10,19,10,ANSWERED,3,1642906542.225832,1642906542.225832,272053
“2022-01-23 02:55:07”,""""" <994501632632>",994501632632,994501632632,asterisk-outcalls,Local/[email protected];1,Wait,5,15,5,ANSWERED,3,1642906507.225813,1642906507.225813,272023
“2022-01-23 02:55:02”,""""" <9609155043>",9609155043,9609155043,asterisk-outcalls,Local/[email protected];1,Wait,5,11,5,ANSWERED,3,1642906502.225787,1642906502.225787,271977
“2022-01-23 02:54:40”,""""" <79549979046>",79549979046,79549979046,asterisk-outcalls,Local/[email protected];1,Wait,5,7,5,ANSWERED,3,1642906480.225633,1642906480.225633,271714
“2022-01-23 02:53:56”,""""" <41799792580>",41799792580,41799792580,asterisk-outcalls,Local/[email protected];1,Wait,5,13,5,ANSWERED,3,1642906436.225358,1642906436.225358,271246
“2022-01-23 02:53:43”,""""" <375334799479>",375334799479,375334799479,asterisk-outcalls,Local/[email protected];1,Wait,5,12,5,ANSWERED,3,1642906423.225274,1642906423.225274,271110
“2022-01-23 02:53:35”,""""" <375255573274>",375255573274,375255573274,asterisk-outcalls,Local/[email protected];1,Wait,5,7,5,ANSWERED,3,1642906415.225227,1642906415.225227,271036
“2022-01-23 02:53:21”,""""" <37069753956>",37069753956,37069753956,asterisk-outcalls,Local/[email protected];1,Wait,5,12,5,ANSWERED,3,1642906401.225150,1642906401.225150,270915
“2022-01-23 02:53:09”,""""" <37066541080>",37066541080,37066541080,asterisk-outcalls,Local/[email protected];1,Wait,5,12,5,ANSWERED,3,1642906389.225078,1642906389.225078,270791
…
Blockquote
Access log is empty
Looking at the asterisk full log we notice that the attach starts with a remote unix connection and then global variables are set followed by call attempts which are in the next post.