[VOIPSEC] Analysis of a VoIP Attack
Klaus Darilion
klaus.mailinglists at pernau.at
Thu Oct 23 10:18:14 CDT 2008
Hendrik Scholz schrieb:
> Hi Klaus!
>
> I was closely involved in this case when it happend and we came to the
> same conclusions as you.
>
> A few sidenotes:
>
> o Did the attackers target VoIP accounts?
>
> I believe they did simply attack/flood destinations that
> most likely have SIP stacks running. Instead of going through
> proxies to resolve phone numbers to IPs etc they would
> simply attack the IPs.
Yes
> o How did the attackers end up with the range of IP addresses
> to scan/attack?
>
> The attacked DSL access/VoIP providers have IP ranges easily
> accessible via RIPE. An attacker can simply pull a list of
> /24's off a website.
If the attacker explicitly search for IP addresses of DSL accounts then
this would mean that the attacker was looking for home users with
Asterisk installation and a insecure configuration (which can be abused
for PSTN termination). Because attacking "normal" SIP phones is IMO not
a business case for the attacker.
> o What kind of preparation was needed?
>
> Close to none I guess. Some assumed that the attackers
> ran through an information gathering phase (i.e. 'UDP ping')
> all valid IPs and obtain a short list of valid SIP targets.
> With dynamic IP addresses this list won't be valid for long.
> The traffic and planning overhead doesn't make sense as
> in the same time an attacker could simply send out more
> INVITEs.
If you try sipvicious in random mode you can easily find your targets
(probably Cisco GWs are a hot attack target)
>
> o What devices were targeted?
>
> None specific I assume. But it worked well for those
> that a) did not check the source IP to filter traffic and
> b) failed to properly check the Contact.
>
> o returned calls
>
> What had to happen did as a matter of fact happen.
> Some users returned calls but as the signalled A party
> number did not have leading zeros some people added national
> or international prefixes.
> In one interesting case customers started to call
> the number in the German PSTN. Some DTAG customer ended up
> getting calls night and day as a result of this.
Funny.
Thanks for your comments
klaus
More information about the Voipsec
mailing list