[AusNOG] VoIP Hack Attempts

Charles n wyble Charles at knownelement.com
Tue Sep 28 00:55:28 EST 2010


Well a vpn gives a good compromise. Setup a site to site vpn. Maybe issue customers a low end Linksys or netgear with openvpn preconfigured. Then they just plug the phone into that.

Otherwise run a closed system.

"Skeeve Stevens" <Skeeve at eintellego.net> wrote:

>Hey all,
>
>I've got a few customers who have noticed a large recent jump in SIP scans against their networks.
>
>Null routing helps the response but doesn't stop the registration initiation - loading up servers with registrations.
>
>This is easy to stop on closed VoIP systems, but not on hosted Voice platforms which users come from other ISP's/networks, this seems to be very difficult.
>
>Does anyone have any ideas - we are fresh out at the moment, apart from beefing up security on the VoIP servers themselves using fail2ban or other things that detect rapid registrations and then firewalls them.
>
>Having a normal server hacked is one thing but VoIP hacking has taken on a new intensity as the hackers can make a LARGE amount of money by comprising a VoIP system.
>
>Recently, we've been brought in to clean up the mess in several incidents where a couple of VoIP systems have been compromised in incidents totalling over AU$100,000.
>
>And the carriers are rarely sympathetic.
>
>If it isn't obvious as to how/why they're doing this - the hackers get in, open a SIP account so their VoIP system can register, and then they channel certain calls via the comprised system.  This has the effect of them charging the end user and making money, while not paying for the calls to be delivered to the destination.
>
>Advice:
>
>-          Block destinations to obscure places that your customers are unlikely to call, and only unblock them if they request
>
>-          Watch billing to certain locations and if there is a massive jump, do something
>
>-          Watch your customers and if their billing jumps by a massive amount, alert them as fast as you can - or you just might be liable
>
>...Skeeve
>
>--
>Skeeve Stevens, CEO
>eintellego Pty Ltd - The Networking Specialists
>skeeve at eintellego.net / www.eintellego.net
>Phone: 1300 753 383, Fax: (+612) 8572 9954
>Cell +61 (0)414 753 383 / skype://skeeve
>www.linkedin.com/in/skeeve ; facebook.com/eintellego
>--
>eintellego - The Experts that the Experts call
>- Juniper - HP Networking - Cisco - Arista -
>
>Disclaimer: Limits of Liability and Disclaimer: This message is for the named person's use only. It may contain sensitive and private proprietary or legally privileged information. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. eintellego Pty Ltd and each legal entity in the Tefilah Pty Ltd group of companies reserve the right to monitor all e-mail communications through its networks.  Any views expressed in this message are those of the individual sender, except where the message states otherwise and the sender is authorised to state them to be the views of any such entity. Any reference to costs, fee quotations, contractual transactions and variations to contract terms is subject to separate confirmation in writing signed by an authorised representative of eintellego. Whilst all efforts are made to safeguard inbound and outbound e-mails, we cannot guarantee that attachments are
virus-free or compatible with your systems and do not accept any liability in respect of viruses or computer problems experienced.
>
>_______________________________________________
>AusNOG mailing list
>AusNOG at lists.ausnog.net
>http://lists.ausnog.net/mailman/listinfo/ausnog

--
from the desk of Charles wyble
ceo & president known element enterprises
xmpp/sip/smtp: charles at knownelement.com
legacy pstn: 818 280 7059



More information about the AusNOG mailing list