[AusNOG] VoIP Hack Attempts

Tom.Minchin at csiro.au Tom.Minchin at csiro.au
Tue Sep 28 07:19:25 EST 2010


We've had similar attacks in the past (attacking our video conferencing units) - one option if you have any kind of IPS or deep packet inspector in front is to drop the SIP registration requests as they all seem to have the same client name. From my research (Google) they use a specific client name which is not used by legitimate requests.

However, I'm sure version 1.1 of their scanner will fix that...

Tom

From: Skeeve Stevens [mailto:Skeeve at eintellego.net]
Sent: Monday, September 27, 2010 10:13 PM
To: ausnog at ausnog.net List <ausnog at ausnog.net>
Subject: [AusNOG] VoIP Hack Attempts

Hey all,

I’ve got a few customers who have noticed a large recent jump in SIP scans against their networks.

Null routing helps the response but doesn’t stop the registration initiation – loading up servers with registrations.

This is easy to stop on closed VoIP systems, but not on hosted Voice platforms which users come from other ISP’s/networks, this seems to be very difficult.

Does anyone have any ideas – we are fresh out at the moment, apart from beefing up security on the VoIP servers themselves using fail2ban or other things that detect rapid registrations and then firewalls them.

Having a normal server hacked is one thing but VoIP hacking has taken on a new intensity as the hackers can make a LARGE amount of money by comprising a VoIP system.

Recently, we’ve been brought in to clean up the mess in several incidents where a couple of VoIP systems have been compromised in incidents totalling over AU$100,000.

And the carriers are rarely sympathetic.

If it isn’t obvious as to how/why they’re doing this – the hackers get in, open a SIP account so their VoIP system can register, and then they channel certain calls via the comprised system.  This has the effect of them charging the end user and making money, while not paying for the calls to be delivered to the destination.

Advice:

-          Block destinations to obscure places that your customers are unlikely to call, and only unblock them if they request

-          Watch billing to certain locations and if there is a massive jump, do something

-          Watch your customers and if their billing jumps by a massive amount, alert them as fast as you can – or you just might be liable

...Skeeve

--
Skeeve Stevens, CEO
eintellego Pty Ltd - The Networking Specialists
skeeve at eintellego.net / www.eintellego.net
Phone: 1300 753 383, Fax: (+612) 8572 9954
Cell +61 (0)414 753 383 / skype://skeeve
www.linkedin.com/in/skeeve ; facebook.com/eintellego
--
eintellego - The Experts that the Experts call
- Juniper - HP Networking - Cisco - Arista -

Disclaimer: Limits of Liability and Disclaimer: This message is for the named person's use only. It may contain sensitive and private proprietary or legally privileged information. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. eintellego Pty Ltd and each legal entity in the Tefilah Pty Ltd group of companies reserve the right to monitor all e-mail communications through its networks.  Any views expressed in this message are those of the individual sender, except where the message states otherwise and the sender is authorised to state them to be the views of any such entity. Any reference to costs, fee quotations, contractual transactions and variations to contract terms is subject to separate confirmation in writing signed by an authorised representative of eintellego. Whilst all efforts are made to safeguard inbound and outbound e-mails, we cannot guarantee that attachments are virus-free or compatible with your systems and do not accept any liability in respect of viruses or computer problems experienced.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20100928/fef816fb/attachment.html>


More information about the AusNOG mailing list