[VOIPSEC] Analysis of a VoIP Attack

Hendrik Scholz hs at 123.org
Thu Oct 23 08:01:26 CDT 2008


Hi Klaus!

I was closely involved in this case when it happend and we came to the
same conclusions as you.

A few sidenotes:

o Did the attackers target VoIP accounts?

  I believe they did simply attack/flood destinations that
  most likely have SIP stacks running. Instead of going through
  proxies to resolve phone numbers to IPs etc they would
  simply attack the IPs.

o How did the attackers end up with the range of IP addresses
  to scan/attack?

  The attacked DSL access/VoIP providers have IP ranges easily
  accessible via RIPE. An attacker can simply pull a list of
  /24's off a website.

o What kind of preparation was needed?

  Close to none I guess. Some assumed that the attackers
  ran through an information gathering phase (i.e. 'UDP ping')
  all valid IPs and obtain a short list of valid SIP targets.
  With dynamic IP addresses this list won't be valid for long.
  The traffic and planning overhead doesn't make sense as
  in the same time an attacker could simply send out more
  INVITEs.

o What devices were targeted?

  None specific I assume. But it worked well for those
  that a) did not check the source IP to filter traffic and
  b) failed to properly check the Contact.

o returned calls

  What had to happen did as a matter of fact happen.
  Some users returned calls but as the signalled A party
  number did not have leading zeros some people added national
  or international prefixes.
  In one interesting case customers started to call
  the number in the German PSTN. Some DTAG customer ended up
  getting calls night and day as a result of this.

Cheers,
 Hendrik

-- 
Hendrik Scholz <hs at 123.org>




More information about the Voipsec mailing list