[AusNOG] VoIP Hack Attempts
Richard Stephens
richard.stephens at neural.com.au
Wed Sep 29 22:53:15 EST 2010
As far as blocking destinations goes - the attackers seem to have cottoned on to this as of late - the last two attacks we've seen that got as far as pushing calls through were pushing them to France and the UK.
We've found that all the successful attacks we've had to deal with have fallen into one of two categories
1. Client-set stupid passwords (password blank or same as extension number)
or
2. Calls coming from a legitimate source such as a wholesale client who has had their VOIP system compromised.
1 is fairly straightforward to deal with - our web interface now enforces strong passwords. 2 is a bit harder but is best dealt with by monitoring at the billing level - setting say a minimum-spend-per-hour for a client, and create alerts or block international calls completely if it goes above an appropriate level for a certain client.
We've also found that blocking all non-Australian IP's virtually eliminates 1.
Regards,
Richard Stephens
Neural Networks
The way information moves.
ACN 124 535 075
Phone: (07) 3123 - 5311
Fax: (07) 3319 - 6095
Mobile: 0410 - 111 - 570
E-Mail: richard.stephens at neural.com.au
________________________________
From: ausnog-bounces at lists.ausnog.net [ausnog-bounces at lists.ausnog.net] on behalf of Skeeve Stevens [Skeeve at eintellego.net]
Sent: Tuesday, 28 September 2010 12:13 AM
To: ausnog at ausnog.net List
Subject: [AusNOG] VoIP Hack Attempts
Hey all,
I’ve got a few customers who have noticed a large recent jump in SIP scans against their networks.
Null routing helps the response but doesn’t stop the registration initiation – loading up servers with registrations.
This is easy to stop on closed VoIP systems, but not on hosted Voice platforms which users come from other ISP’s/networks, this seems to be very difficult.
Does anyone have any ideas – we are fresh out at the moment, apart from beefing up security on the VoIP servers themselves using fail2ban or other things that detect rapid registrations and then firewalls them.
Having a normal server hacked is one thing but VoIP hacking has taken on a new intensity as the hackers can make a LARGE amount of money by comprising a VoIP system.
Recently, we’ve been brought in to clean up the mess in several incidents where a couple of VoIP systems have been compromised in incidents totalling over AU$100,000.
And the carriers are rarely sympathetic.
If it isn’t obvious as to how/why they’re doing this – the hackers get in, open a SIP account so their VoIP system can register, and then they channel certain calls via the comprised system. This has the effect of them charging the end user and making money, while not paying for the calls to be delivered to the destination.
Advice:
- Block destinations to obscure places that your customers are unlikely to call, and only unblock them if they request
- Watch billing to certain locations and if there is a massive jump, do something
- Watch your customers and if their billing jumps by a massive amount, alert them as fast as you can – or you just might be liable
...Skeeve
--
Skeeve Stevens, CEO
eintellego Pty Ltd - The Networking Specialists
skeeve at eintellego.net / www.eintellego.net
Phone: 1300 753 383, Fax: (+612) 8572 9954
Cell +61 (0)414 753 383 / skype://skeeve
www.linkedin.com/in/skeeve ; facebook.com/eintellego
--
eintellego - The Experts that the Experts call
- Juniper - HP Networking - Cisco - Arista -
Disclaimer: Limits of Liability and Disclaimer: This message is for the named person's use only. It may contain sensitive and private proprietary or legally privileged information. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. eintellego Pty Ltd and each legal entity in the Tefilah Pty Ltd group of companies reserve the right to monitor all e-mail communications through its networks. Any views expressed in this message are those of the individual sender, except where the message states otherwise and the sender is authorised to state them to be the views of any such entity. Any reference to costs, fee quotations, contractual transactions and variations to contract terms is subject to separate confirmation in writing signed by an authorised representative of eintellego. Whilst all efforts are made to safeguard inbound and outbound e-mails, we cannot guarantee that attachments are virus-free or compatible with your systems and do not accept any liability in respect of viruses or computer problems experienced.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20100929/b4c5bed8/attachment.html>
More information about the AusNOG
mailing list