VOIP voicemail hacked aka DISA toll fraud
-
@scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:
Most of our customers control their own accounts, so if they pre-load or not doesn't come through us. But we never recommend just having it auto-load.
With this customer - it's kinda 50/50. When I get the renewal notices (and they get them too) i remind them to log in or give me a CC to add more money.
-
@magicmarker said in VOIP voicemail hacked aka DISA toll fraud:
@DustinB3403 said in VOIP voicemail hacked aka DISA toll fraud:
The documentation for the Cisco Unity system says there are policies that can be set for the voicemail pin, including minimum length, the duration an account is locked, if an admin has to manually unlock an account etc.
After the fraud, the VOIP provider has implemented stronger policies for PIN's now. I will be talking to them about implementing some sort of stoppage on international calls after they hit a certain limit. We are also going to take a hard look at turning off international calling and/or picking specific countries that we need to contact.
Yeah, that's pretty much all you can do. Police your own people, investigate why voicemail was allowed to do as much as it was (maybe getting off of Cisco is part of your solution, not sure how many systems are really susceptible to voicemail attacks in this manner), find out how voicemail was accessed without access to something more, have the vendor lock down anything that could explode usage that isn't needed like calls to countries that you'd never made, and put in some kind of rate limiting.
There is always going to be some risk, but you can reduce it in both likeness of happening again, and in the scope of potential damage.
-
@JaredBusch is FreePBX susceptible to this kind of attack? On none of ours is voicemail ever the first line of defense, first of all. But even if someone breached voicemail, I don't think that they can use that to make calls. I know some systems do, and Cisco is pretty renowned for lacking security, and I might easily be overlooking something, but I feel like this isn't a normal attack vector outside of the Cisco world.
-
@scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:
@JaredBusch is FreePBX susceptible to this kind of attack? On none of ours is voicemail ever the first line of defense, first of all. But even if someone breached voicemail, I don't think that they can use that to make calls. I know some systems do, and Cisco is pretty renowned for lacking security, and I might easily be overlooking something, but I feel like this isn't a normal attack vector outside of the Cisco world.
IIRC it is possible but disable by default.
-
@scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:
@JaredBusch is FreePBX susceptible to this kind of attack?
I was wondering the same thing.
-
@scottalanmiller Jared Busch finished about a liter of sake last night. Ask him later.
-
@scottalanmiller It may not matter here but we have an old Cisco system and our pins are 7 digit so it seems it is customizeable.
-
By default it does not work unless someone goes into this hard to find setting and populates it.
If you dial into my voicemail with my password and hit option 3 for advanced options, the only valid choice is option 5 to leave a message for another extension. There is no way to break out of it. Hitting option 4 kicks it back to the initial mailbox menu.
-
@JaredBusch that's what I thought. As I look at our systems, none seem to have any susceptibility to this kind of attack. Maybe Cisco doesn't out of the box and someone enabled this ridiculousness? That seems unlikely, but who knows.
-
For me, I do auto funding but only in the range of $50-80 per hit.
This way I get alerts on my iPhone from my c/c every time a VOIP replenish charge goes through.I also have International calls disabled.