Asterisk Vishing Attacks "Endemic" 141
Ian Lamont writes "Remember the report last year that the FBI was concerned about a 'vishing' exploit relating to the Asterisk IP PBX software? Digium played down the report, noting that it was based on a bug that had already been patched, but now the company's open-source community director says that attacks on Asterisk installations are 'endemic.' There have been dozens of reported vishing attacks in recent weeks, says the article: 'The victims typically bank with smaller regional institutions, which typically have fewer resources to detect scams. Scammers hack into phone systems and then call victims, playing prerecorded messages that say there has been a billing error or warn them that the bank account has been suspended because of suspicious activity. If the worried customer enters his account number and ATM password, the bad guys use that information to make fake debit cards and empty their victim's bank accounts.'"
Vishing? (Score:4, Insightful)
What is that, voice phishing? What's next, we're going to call telemarketers "vammers"? And we'll call phreakers "vackers"?
I'm sure we could come up with a better term than "vishing".
Re: (Score:3, Funny)
I'm sure we could come up with a better term than "vishing".
Like voice phishing? ;)
Phone Phishing (Score:3, Insightful)
Re: (Score:2, Funny)
Re:Vishing? (Score:4, Insightful)
If the alternative is phreashing and phreammers, then I'll prefer "vishing". That said, I doubt most cases are using an actual "bug" in Asterisk, it is much more likely there are different setups, were some are incorrectly setup to handle _one_ of the many combinations of diversion, refer, redirection, route, proxy, RFC and draft SIP features that Asterisk "supports".
Re: (Score:2, Insightful)
Re:Vishing? (Score:4, Insightful)
Yeah, "Phishing" still seems to apply as an appropriate term to describe social engineering attempts by email, which is already a pretty specialized term, where "email fraud" would have worked just as well to start with (since it is closely related to an existing term "mail fraud" which indicates the snail mail version of the same attempt). As usual, a term was invented to describe something that is harder for the layman to understand than the original term. Hey, we're geeks, new confusing terms are cool, so deal. 1337 n3w w0rdz0rz ru1z!
A phisher is still sending someone an email and asking them to take a specific action that, if you take it, will result in you giving up important information to someone wearing a black hat. We don't need separate terms to describe every possible nuance of the way you would potentially send the information back. If someone sends me an email with form they want me to fill out and mail, do I have to call that mhishing? And what if they want me to fax it? fhishing? What if they simply want me to reply to them with some information? rhishing?
What if you get an email that gives a bad link *AND* a scammer's phone number? pvhishing? Or does the order of the "p" and "v" depend on which appears in the email fraud attempt first, so it could be pvishing or vphishing? And do I read that right-to-left or top-to-bottom to determine "first"?
Is there a 3-week class on this new terminology, or a 12-step program to get people to stop using it?
Re: (Score:2)
Never mind, I did read, but failed to comprehend, the article. Stupid me.
Anyway, I still don't think we need a new term. In fact, I think we already have one. "Telephone fraud".
Re: (Score:1)
Re: (Score:3, Insightful)
But all 9 syllables refer to concepts already stored in my brain. "Code Re-use"!
Re: (Score:2)
IMHO, "FBI warns of scam exploiting Asterisk PBX software" is far more meaningful to more people than "FBI warns of vishing attack e
Re: (Score:2)
Re: (Score:2)
I agree - "vishing" is a stupid term.
Re:Vishing? (Score:4, Funny)
Re: (Score:2)
You laugh, but my first thought was that it was referring to Vishy Anand [wikipedia.org], current World Chess Champion.
Re: (Score:2)
Nah, following the "vishing" substitution logic, I come up with telemarketing spammers = tammers and phreaker hackers would be phackers.
Re: (Score:2)
And if a phacker tried to spam a woman with kids, he'd be known as a mother phacker?
Re: (Score:2)
Re: (Score:3, Funny)
What's next, we're going to call telemarketers "vammers"? And we'll call phreakers "vackers"?
How about varmints [merriam-webster.com] and pharmints?
Telemarketers don't deserve a new word, especially when an existing one fits so well. Phreakers at least are exhibiting some level of skill, even if it is in a somewhat antisocial manner (so I assume, at least).
Re: (Score:2)
Re: (Score:2)
How about calling the lot of them "dicks"? I think that pretty well sums it up.
Re: (Score:3, Informative)
vishing is what Dracula does on his holidays.
Re: (Score:2)
I second this sentiment. Let's reserve "Vishing" for people pretending to be Vishnu [wikipedia.org].
Re: (Score:2)
those Phreaking Vishers........
Re: (Score:1)
Yes, really. Not only that but soon there will be virtual actors or vactors.
Re: (Score:3, Funny)
"Vishing" is what it is called when Vishnu [wikipedia.org] goes fishing [wikipedia.org].
Re: (Score:2)
I wondered the same thing, so I googled. Vishing is the criminal practice of using social engineering over the telephone system [wikipedia.org]
I do vish they'd have come up with a better name... but considering GNU, TWAIN, Windows, iPod, (and especially that abominably named "WiFi"), we as a group are pretty bad at coming up with good names.
A new name...Why ? (Score:2)
How about thieves, frauds, con-men, or scam artists ?? I find it hard to believe this is actually a problem. Is there REALLY anyone out there STUPID enough to give up your pin ? C'mon folks the real bankers don't need it to do what they do,ANYONE asking for your PIN is a thief, plain and simple. If you give anyone your PIN other than your more significant half you are a fool of the worst possible kind, and likely deserve what is coming to you. Tell you parents and grandparents that there is NEVER an emergen
Re: (Score:2)
I'm sure we could come up with a better term than "vishing".
You might vant to throw a coin in the vishing vell.
Re: (Score:2)
Is spear phishing related to porn?
_All_ prerecorded calls are spam. (Score:2)
I always hang up as soon as I recognize them for what they are. On the rare occasions when someone who actually has something to say that I need to hear tries to use one they always follow up with a real phone call or a letter.
Re:_All_ prerecorded calls are spam. (Score:5, Informative)
I was getting a recorded message from a spoofed cid at 000-000-0000 and would always kill the call as I saw it come in. Turns out it was the my gas company trying to resolve some billing issues.
A note to all "legit" businesses out there, blocked numbers and especially spoofed cids are super sketchy, don't do it.
Re: (Score:2)
And robocalls. When I hear "please wait" when I answer the phone, I don't bother waiting around to see what moronic company is trying to spam me, I just hang up.
Re: (Score:2)
Re: (Score:2)
The problem is nobody should *ever* fall for this, no matter how good the caller sounds.
Someone phones you. CLID can be faked. Can't trust that. Unless they have some way of authenticating themselves to you treat them as unknown.
That phone call contains another number. Ignore it. Go to the website of your bank, find a published customer service number and ask them.
It's exactly the same as anyone with any sense has been doing for years.. telephone scams aren't new. Now if the bank's calling system is c
Re: (Score:2)
> Now if the bank's calling system is compromised..
My credit union has a branch six miles away and head offices at about 25 miles. If I ever get something purports to be a recorded call from them I won't be contacting them by phone.
Re: (Score:2)
I always hang up as soon as I recognize them for what they are.
Not me. I set the phone on my desk, press the "mute" button and tie up the telemarketers' phone lines for as long as possible while I get back to reading /.^w^w^wwork. Kind of a low-tech La Brea tar pit [sourceforge.net].
Re: (Score:1)
Re: (Score:2, Informative)
Asterix (Score:1)
Re: (Score:1)
And there'll be a huge banquet with wild boars roasted on a spit and ale !
Re: (Score:2)
This just in: Home cooking is killing McDonalds.
Vishing (Score:3, Informative)
http://en.wikipedia.org/wiki/Vishing [wikipedia.org]
Either that or it's an old world ethnic pronunciation of the word "wishing".
Verevolves! (Score:2)
There...Volves!
Security! (Score:2)
Security patches are there for a reason. Security.
Re: (Score:2)
Re: (Score:3, Informative)
Moral of the story (Score:5, Insightful)
Don't give sensitive information away unless in person. If you bank says there's something wrong with your account, either call them via their listed phone number or go visit them in person.
Re: (Score:3, Informative)
You go to your bank, your bank doesn't come to you.
Re: (Score:2)
Re: (Score:2)
> It however doesn't fix the problem of when the customer (or someone
> pretending to be them) calls the company.
That, however, places the liability on the company.
Re: (Score:1)
> It however doesn't fix the problem of when the customer (or someone > pretending to be them) calls the company.
That, however, places the liability on the company.
Unfortunately, for checking and savings accounts in the US, it does not. If someone empties your bank account via false identification, your bank is not liable for your losses.
Re: (Score:1)
Yup, keep yer money in your sock like I do! No one gets it, and you ever get in trouble you can bust out the sock and weild that shit like a blackjack tear it up!
Re: (Score:2)
If you bank says there's something wrong with your account, either call them via their listed phone number or go visit them in person.
This is missing the point of the article. It's the banks voice mail systems that were compromised. So even if you call them back at their official listed number, you may still be duped by their re-programmed voice mail system.
Re: (Score:2)
Which article said that? So far as I can tell, the compromised phone systems belong to random businesses. Calls are then made from the compromised system, meaning the attacker doesn't have to pay for the calls they're making, and also makes it harder to trace the scam back to them.
It's just like spammers using compromised/"zombie" machines to send their spam. They're offloading the cost and risk to others, while still providing the benefit to themselves.
Fishing, phishing, vishing, what's next? (Score:5, Funny)
Re: (Score:2)
We need a "Funny AND Insightful" mod that goes to 6 so there's a little extra when you need it.
Because, for the post I am replying to, we need it.
Re: (Score:2)
Re: (Score:2)
But... it goes to 6.
Re: (Score:2)
I just vish zat zey vould ztop vith the forced vords.
Re: (Score:1)
I had a relative that used to raise ghots. Some veeps and vickens, too.
Every morning you voke the vows, and vilked them vry.
Re: (Score:2)
Just whatever you do, don't click on brain://vr.fishse.facebook.gov.
Usage guide (Score:1, Insightful)
Vishing is pronounced "wishing," as in "I am vishing to see your nuclear vessels."
Re: (Score:2, Funny)
I got one of those calls. (Score:2, Interesting)
Re:I got one of those calls. (Score:5, Funny)
If you're like me (and most of Slashdot), you don't need to call the FBI at all. Just look straight into the webcam and tell them what the problem is.
Don't believe the naysayers that tell you that government is inefficient.
Re: (Score:2)
If you do buy into the inefficiency thing then go old school and send an email that begins...
"Dear Uncle bin laden, what is your new address again?"
Lock Down Your Phones, People! (Score:1)
Re: (Score:2)
Just using FreeSWITCH is not a security solution. It isn't like Asterisk is designed to route toll calls for all callers as a default or something. Software has bugs. Some bugs are security problems. Make sure you apply security updates ASAP. Asterisk even has a mailing list specifically for security updates which makes it super simple to know when you really need to apply a patch.
Re: (Score:2)
Re: (Score:1)
VoIP is an enabling technology, and like all enabling technology both consumers and crimin
Re: (Score:1)
Complete crap (Score:4, Insightful)
What a load of crap. Asterisk developers patch security holes relatively quickly. This isn't an Asterisk "endemic."
Brute forced passwords are a bad administrator "endemic."
If your password policy is so stupid that you can be wordlisted then the issue may just be a PICNIC problem and not a fault of an application.
Asterisk isn't a security application. It's an enterprise-grade VoIP server and PBX.
Connecting Asterisk to a public network without some sort of border control is just stupid.
Re: (Score:1, Interesting)
You probably never worked on the telecom field to say that, the fact is that there is a much better alternative and that alternative is FreeSWITCH.
Just take a look at this:
"How does FreeSWITCH compare to Asterisk?"
http://www.freeswitch.org/node/117
Re: (Score:2, Interesting)
I work in engineering design for an ILEC and admin Asterisk on a day-to-day basis within our test facilities.
I completely agree that Asterisk is not carrier-grade but that doesn't negate the fact that it's being used for carrier-grade applications by many operators.
Hell, most linux distros aren't carrier grade. We're not arguing that point. I agree completely.
To me, Asterisk is a perfect drop-in replacement for a legacy pbx when serving in-house sip clients. Perhaps saying the app is enterprise-class is a b
Re: (Score:2, Informative)
I can't say the same with Asterisk really because I had many bad experiences with it, some of these bad experiences includes: deadlocks, crashes, transcoding problems, corrupted sound issues, etc.
I work in the telecom industry as well and I was an Asterisk user who migrated to FreeSWITCH for the reasons that is more stable and performs better, I have also worked for companies such as Teliax Inc, etc. I'm also starting m
Re: (Score:2, Interesting)
DISCLAIMER: I sometimes use ubuntu server so I can't really point any fingers re: CGL
Be careful, "ok for carrier-grade" isn't the same as being CGL 4.0 compliant. There are only a handful of certified CGL's.
http://www.linuxfoundation.org/collaborate/workgroups/cgl [linuxfoundation.org]
I've personally had great experiences with Asterisk but we're using it in a completely nonstandard (if there is such a thing) way.
We do a lot of code hacking to emulate customer troubles with presentation, etc.
For us, it's great and filled our need
Re: (Score:3, Interesting)
I've used Asterisk in installations with 10s of thousands of users--and this was probably 4 years ago or so. It certainly wasn't initially designed for it--but it will most certainly do the job if you are willing to put in the work. And it is light years ahead of where it was when I was using it for carrier-grade operations.
Don't get me wrong, there are certainly things that need improvement--especially in the area of being able to do live migrations and failover w/o dropping calls, but there are some trul
Re: (Score:3, Interesting)
I remember you...you were that guy that spammed the asterisk bug tracker saying that people should switch to FreeSWITCH on about 10 different bugs. Nice to see that some things never change.
Re: (Score:2, Interesting)
I'm beginning to think you are just a jerk. Perhaps it's your interaction with devs that should be called into question?
Some of your bugs look like they got a lot of good attention despite the fact that your reports are terrible...
http://www.google.com/search?q=%22diego.viola%22+site%3Aissues.asterisk.org [google.com]
Your bug reports are often not well documented or easily duplicated.
I've had excellent traction on bugs and issues from the asterisk dev teams.
I even go on IRC occasionally and ask really oddball what-if qu
Re: (Score:2)
I've actually checked out FreeSWITCH quite thoroughly. I believe I said before that I've used the app?
There were many of Diego's comments that I agreed with. I don't hate him. I never said I hate him. I think the strongest thing I said was "I'm beginning to think you are just a jerk." As far as i'm concerned, he is. In all honesty you can't behave like an idiot and expect to get your bugs looked at with any seriousness. You can't go onto public communities and rant completely off-topic without expecting so
[OT] Re:Complete crap (Score:4, Insightful)
No, I was just annoyed at your impolite behavior at the time with all of the spamming. Then I noticed this story and saw that you are still at it. I'm glad you found a solution that works for you. Many people have also found other solutions that work great for them, including Asterisk.
Part of having such a huge user community is that the Asterisk devs have 100s of feature requests or bug reports at any given time. If someone is having a problem that is only having an effect on a very small number of people, sometimes it takes longer to fix than other problems. Everyone has to prioritize.
Also, the quality of the debugging information that is presented is also a major factor in how long it takes to get a problem fixed. This [asterisk.org] is a good example of 3 or 4 actual Asterisk developers trying work on one of your issues and you being rude to them and not giving them the debug information they requested.
I understand that having an issue that is affecting you take a while to get closed is annoying, but something being open for a week with no real information provided to help track it down is certainly no reason to get react the way you did.
And us Asterisk users aren't pissed about FreeSWITCH existing--that is just silly. The more choices out there, the better! We just don't like people coming over and shouting YOU SUCK and doing the equivalent of spray painting our walls with "FreeSWITCH RULEZ!" like you did with the bug tracker. That is just childish. There are many excellent and polite freeswitch users and developers--I just don't think that you are one of them.
Re: (Score:2)
Re: (Score:2)
Re:Complete crap (Score:4, Insightful)
It would be trivial to portscan far and wide, find some asterisk boxes, and exploit these terribly common mistakes made by clueless admins. I have demonstrated to clients how I was able to log into their server armed only with the knowledge of what the default ftp username and password is, then download all their users' config files containing all the information I'd need to fraudulently use their phone lines. Sometimes it takes a dramatic demonstration like that to make people wake up.
Re: (Score:2)
It's worse than that, actually. Cisco 7960's are pretty brain dead. They pull their configs off tftp based on the mac address. Flip the phone over and write down some digits and you're halfway there. Keys to the kingdom on the bottom of the phone.
Re: (Score:2, Informative)
Agreed. Couple that fact with the fact that a lot of the repos I've seen are built off of older iterations of the Asterisk code and it's a recipe for disaster. For example, Ubuntu has Asterisk 1.4.21.2 in the repository right now. This is directly exploitable:
http://downloads.asterisk.org/pub/security/AST-2009-003.pdf [asterisk.org]
If you run code out of repos without understanding the risks that's still an admin fail, though. Not the fault of Asterisk, per se.
Re:Complete crap (Score:5, Interesting)
Re: (Score:2, Informative)
Have you looked at http://packages.digium.com/ [digium.com] or maybe about checking out the svn branch for the version you are using?
You didn't say what distro you use but if it's YUM-capable that might be an option.
Personally, I'm against precompiled binaries for Asterisk. Asterisk source doesn't have any configs all other than samples. It's up to the admin to correctly configure the server. I like sticking to SVN as it allows me to make changes and also stay up to date. It's not perfect and I highly advise regression
Re: (Score:2)
You don't have to compile asterisk any differently to run it as non-root, you just have to set up the permissions on files/directories appropriately and set runuser/grungroup in asterisk.conf.
undoing moderation (Score:2, Funny)
Just use FreeSWITCH instead of Asterisk (Score:1)
Please be careful (Score:1)
I think the real question is why there are so many Asterisk-based systems out there with little or no security in place. My guess is that it's because a lot of people just download it and throw it onto a customer's site. Oopsie.
The advantage that FreeSWITCH gives is that it makes security easie
Language Problems? (Score:1)
Digium says: Protocol, not program (Score:3, Informative)
So as is unfortunately typical, some of the quotes I made of course been taken out of proportion. My quote was not that "Asterisk attacks are endemic", but that SIP-based brute force attacks are endemic. Every SIP system that is open to the "public" Internet is seeing large numbers of brute-force attacks. Sites that have weak username and weak password control will be compromised - this is little different than email accounts being taken over by password-guessing systems and used for sending floods of email. The significant difference is that when someone takes over a SIP platform to make outbound calls, there is usually a direct monetary cost, which gets people's attention very quickly. I hear reports of these types of attacks now all the time - it's not unusual, and it's not just Asterisk. We had a blog about this a year ago; this is just a re-packaging of the same news a year later, when recently I unsurprisingly said that attacks are no longer even newsworthy because they're so frequent (hence, the term "endemic".) Apparently, not being newsworthy means... it's newsworthy!
This has little to do with Asterisk other than it happens to be the most prevalent SIP-based platform on the Internet currently. It has everything to do with protocol attacks by script kiddies, or more professional attackers. Bad passwords = easy penetration. The upside on this is that it yet again gets the attention of administrators who might not otherwise know that their password of '1234' might be guessed by criminal users.
The bug that was mentioned? Old news. Really, really old news. And really not even that much of a threat for most people the way they have their systems configured even if they haven't upgraded.
Asterisk, Broadsoft, Cisco, Kamailio, OpenSER, FreeSwitch, Avaya - they're all vulnerable to the brute force attacks if adequate network and username/password security is not implemented. There are ways to minimize, if not eliminate these threats with very standard security policies that should be familiar to any network administrator (ACLs, random passphrases, random client usernames, adequate exception logging, and limits on account usage, to name a few.)
Just as an aside, the Digium SwitchVox platform, which is our commercial re-packaging of Asterisk, has as an element of it's GUI a tool that indicates the relative strength of passwords. We'd encourage any other re-packagers or users of Asterisk to implement a similar UI hint that forces good password behavior by users and local admins. It's really not something that can be done in the core of Asterisk; it has to be done by whatever is the layered UI on top of Asterisk for configuration, or just by good policy.
http://blogs.digium.com/2009/03/28/sip-security/ [digium.com]
http://blogs.digium.com/2008/12/06/sip-security-and-asterisk/ [digium.com]
John Todd - jtodd@digium.com
Digium, Inc.
Asterisk Open Source Community Director
Re: (Score:2)
There's no good algorithm for telling the strength of a password (password strength is related to the Kolmogorov complexity [wikipedia.org] of the password, which is incomputable), and every
Re: (Score:2)
I'm not familiar with how Switchvox determines the strength of a password, however...
It should strike everybody here as obvious that '1234' on an account '1234' would be a poor password. I could say with some confidence that 'apple' would be universally considered to be a poor password, just based on it being a common dictionary word.
Unfortunately, there are many people who don't share this understanding. It most certainly isn't unique to VoIP.
Re: (Score:3, Interesting)
John, one of the ways I got people to use "good" passwords is by getting them a Yubikey [yubico.com] and setting it to static mode. It then always generates the same password instead of an OTP, but it's a very long one and as it pretends to be a keyboard it types it in itself. The challenge is always to make it long enough to be safe, but short enough to actually fit in the entry field.
It is a simple way to both SET a decent password and to preserve that setting in other than a file..
Just a tip, and no, I don't work f
Vishing and hoping (Score:3, Funny)
'Vishing', eh? Vot are we going to call 'video phishing'?
Pishing?
Re: (Score:1)
The FBI cares, and the Secret Service is also involved in the investigation and prosecution of things related to phishing (carding, for example), but it can be hard to get to the right people.
The Anti-Phishing Working Group may (or not, I'm uncertain) may have some contact info for the right parties.
Before you ask why I didn't provide a link, it's because that would be such a good place to put a link leading to a drive-by download of malware. Don't trust links on Slashdot, look it up for yourself.