[VOIPSEC] SPIT and vishing
Dan York
dyork at voxeo.com
Thu Jul 17 11:35:29 CDT 2008
Thijs,
Welcome to the VOIPSEC list and it's great that you are doing research
in this field. More research is definitely needed. To that end, you
may find some great sources of information from the recent IPTCOMM
event in Heidelberg, Germany:
http://www.iptcomm.org/
The attendees included a huge number of the leading researchers in the
field. The program schedule is here:
http://www.iptcomm.org/page14/page14.html
The presentations were all put up yesterday at:
http://www.iptcomm.org/page15/page15.html
I don't see anything in there specific to botnets or SPIT, per se, but
all of them are dealing with VoIP security.
As to some of your specific questions, my comments are inline:
On Jul 17, 2008, at 10:03 AM, Thijs van Esveld wrote:
> Thank you Tobias,
>
> The only proof I found about a VoIP botnet is probably the same poc
> as the
> one you know of.
IMHO, we won't see serious botnets targeted at SIP until there is a
viable market for that to happen. Right now, how many actual SIP
servers are exposed on the public Internet? How many actual SIP
proxies are waiting on the public Internet to accept SIP connections?
Yes, the numbers are increasing... but still, what we are talking?
Hundreds? Thousands? As much as I'm a huge proponent (and user) of
SIP, I somehow don't think we are talking about 10s of thousands of
Internet-exposed SIP proxy servers. (Maybe we are.... please tell me
I'm wrong... I'd love to be wrong on this one.) Sure, there are
probably tens of thousands of SIP endpoints (phones, softphones) out
there (maybe more?), but how many are exposed to the open Internet?
A botnet needs *targets* to justify the time spent on creation... and
in my opinion we're not there yet.
If we think of the motivation of running a botnet, off the top of my
head, I can think of two main uses cases:
1. DDOS - you want to take down someone's service, either for revenge,
for fun or because you're being paid by someone else to do so (or
you're going to try to get the company to pay you to stop). So for
SIP, you want to kill someone's ability to make/receive calls. So you
launch a massive DDoS against the SIP proxy on the network edge. Ta
da... the SIP proxy is completely occupied dealing with bogus requests
and calls can't go out.
2. SPAM/SPIT - you want to flood someone's phone system with voice
spam/SPIT and want it to originate from many endpoints so that it
can't be easily stopped or traced. So you have bots open up SIP
connections and start streaming audio to anyone who answers.
In both cases, you need to have SIP servers that you can attack.
Sure, they are out there, but I would argue that they aren't *yet*
plentiful enough to justify someone spending the time to create a
botnet. Most research has found that botnets are all financially
motivated at this stage in time... and I don't see the return-on-
investment yet for someone wanting to build a SIP-focused botnet. The
time *will* come, though.
Likewise, to your general question about SPIT, I don't think we'll see
it until you can have the equivalent random connections between SIP
endpoints that we have on the PSTN. Think about it. There are
something like 3,000 people on this mailing list... probably 3 of us
can actually receive a SIP call from another random SIP endpoint. (I
can - sip:dyork at corpsip.voxeo.com ) Maybe with this VoIP-centric list
it might be 10 people... maybe 50... but regardless, it's not many,
and certainly isn't a viable market for someone to set up a large SPIT
operation.
Most of the SIP connections from enterprises are out to SIP service
providers and they are all authenticated (or *should* be). The
enterprise SIP proxy will only allow connections from the SIP service
provider and no one else. Or SIP proxies might allow connections in
from specific IP addresses. In any case, it *won't* accept
connections from random SIP endpoints out there.
The reality is that while I may have a SIP infrastructure in my
company and you may have one in yours, for us to communicate to each
other, we're still going through SIP service providers and across the
PSTN. The PSTN serves as a defacto firewall between us.
This will change. More and more people are looking at how to link up
their SIP clouds in federations and other forms. But until the time
comes when: a) there are tons of SIP servers exposed on the Internet;
and b) those servers allow connections from random SIP endpoints...
until that time, there's not a huge market potential for someone to
bother setting up a SPIT operation.
> I combined your definition
> of vishing with mine and I think it now covers the subject way
> better, I
> will only focus on vishing with the help of VoIP.
The linguist in me truly detests the word "vishing", but we are
probably stuck with it. I agree with Tobias' definition. Vishing is
trying to get sensitive data by using voice technologies vs. email/
websites. To me, "vishing" is simply another modality of
"phishing"... adding voice into the mix of email and websites... and
often used together. For example, you get an email that looks like it
is from your bank saying that you urgently need to contact your bank
fraud department and asking you to call this phone number. You call
that number and get an IVR system that *sounds* like your bank
(because the attacker probably recorded all the prompts in your bank's
IVR tree). You go through the prompts... perhaps even talk to
someone... and ultimately give away your info.
> Do you people here at VOIPSA think we will be ready for the SPIT
> problem
> when the big wave hits the world very soon? For what I've been
> reading and
> thinking about a worst case scenario, where a current botnet herder
> manages
> to make his botnet (for example Srizbi) send SPIT aswell, it would
> result in
> utter chaos.
As I note above, I think we're a ways out until there are enough SIP
servers out there on the public Internet to justify a botherder
bothering to spend any time on it. They are making way too much money
right now spewing out email spam or executing DDoS attacks. Why
bother going from that to something where there are so few targets?
(Especially when, for a basic DoS attack on a SIP server, you could
just use a regular network DDoS botnet attack.) Until there are
masses of targets, I don't see it happening.
Will we be ready when we do get to that point? I hope so... that's
one of the reasons why there is a huge amount of work going on in the
IETF right now around the area of "strong identity". Most of us view
that as one of the key building blocks in combatting SPIT. We'll see.
Hope this helps... best wishes with your research,
Dan
--
Dan York, CISSP, Director of Emerging Communication Technology
Office of the CTO Voxeo Corporation dyork at voxeo.com
Phone: +1-407-455-5859 Skype: danyork http://www.voxeo.com
Blogs: http://blogs.voxeo.com http://www.disruptivetelephony.com
Build voice applications based on open standards.
Find out how at http://www.voxeo.com/free
More information about the Voipsec
mailing list