ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    VOIP voicemail hacked aka DISA toll fraud

    IT Discussion
    10
    43
    3.0k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller
      last edited by

      Most of our customers control their own accounts, so if they pre-load or not doesn't come through us. But we never recommend just having it auto-load.

      JaredBuschJ DashrenderD 2 Replies Last reply Reply Quote 0
      • JaredBuschJ
        JaredBusch @scottalanmiller
        last edited by

        @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

        Most of our customers control their own accounts, so if they pre-load or not doesn't come through us. But we never recommend just having it auto-load.

        Some do, some do not. But when it is all set up the first time they are told that it is not allowed without signing a waiver that charges are not my problem.

        Of course one could change it afterwards, but none have yet.

        1 Reply Last reply Reply Quote 0
        • magicmarkerM
          magicmarker @DustinB3403
          last edited by

          @DustinB3403 said in VOIP voicemail hacked aka DISA toll fraud:

          The documentation for the Cisco Unity system says there are policies that can be set for the voicemail pin, including minimum length, the duration an account is locked, if an admin has to manually unlock an account etc.

          https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/8x/administration/guide/8xcucsagx/8xcucsag160.pdf

          After the fraud, the VOIP provider has implemented stronger policies for PIN's now. I will be talking to them about implementing some sort of stoppage on international calls after they hit a certain limit. We are also going to take a hard look at turning off international calling and/or picking specific countries that we need to contact.

          scottalanmillerS 1 Reply Last reply Reply Quote 2
          • DashrenderD
            Dashrender @scottalanmiller
            last edited by

            @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

            Most of our customers control their own accounts, so if they pre-load or not doesn't come through us. But we never recommend just having it auto-load.

            With this customer - it's kinda 50/50. When I get the renewal notices (and they get them too) i remind them to log in or give me a CC to add more money.

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @magicmarker
              last edited by

              @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

              @DustinB3403 said in VOIP voicemail hacked aka DISA toll fraud:

              The documentation for the Cisco Unity system says there are policies that can be set for the voicemail pin, including minimum length, the duration an account is locked, if an admin has to manually unlock an account etc.

              https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/8x/administration/guide/8xcucsagx/8xcucsag160.pdf

              After the fraud, the VOIP provider has implemented stronger policies for PIN's now. I will be talking to them about implementing some sort of stoppage on international calls after they hit a certain limit. We are also going to take a hard look at turning off international calling and/or picking specific countries that we need to contact.

              Yeah, that's pretty much all you can do. Police your own people, investigate why voicemail was allowed to do as much as it was (maybe getting off of Cisco is part of your solution, not sure how many systems are really susceptible to voicemail attacks in this manner), find out how voicemail was accessed without access to something more, have the vendor lock down anything that could explode usage that isn't needed like calls to countries that you'd never made, and put in some kind of rate limiting.

              There is always going to be some risk, but you can reduce it in both likeness of happening again, and in the scope of potential damage.

              1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller
                last edited by

                @JaredBusch is FreePBX susceptible to this kind of attack? On none of ours is voicemail ever the first line of defense, first of all. But even if someone breached voicemail, I don't think that they can use that to make calls. I know some systems do, and Cisco is pretty renowned for lacking security, and I might easily be overlooking something, but I feel like this isn't a normal attack vector outside of the Cisco world.

                coliverC A JaredBuschJ 3 Replies Last reply Reply Quote 0
                • coliverC
                  coliver @scottalanmiller
                  last edited by

                  @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

                  @JaredBusch is FreePBX susceptible to this kind of attack? On none of ours is voicemail ever the first line of defense, first of all. But even if someone breached voicemail, I don't think that they can use that to make calls. I know some systems do, and Cisco is pretty renowned for lacking security, and I might easily be overlooking something, but I feel like this isn't a normal attack vector outside of the Cisco world.

                  IIRC it is possible but disable by default.

                  1 Reply Last reply Reply Quote 0
                  • A
                    Alex Sage @scottalanmiller
                    last edited by

                    @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

                    @JaredBusch is FreePBX susceptible to this kind of attack?

                    I was wondering the same thing.

                    1 Reply Last reply Reply Quote 0
                    • JaredBuschJ
                      JaredBusch @scottalanmiller
                      last edited by

                      @scottalanmiller Jared Busch finished about a liter of sake last night. Ask him later.

                      1 Reply Last reply Reply Quote 1
                      • jmooreJ
                        jmoore @scottalanmiller
                        last edited by

                        @scottalanmiller It may not matter here but we have an old Cisco system and our pins are 7 digit so it seems it is customizeable.

                        1 Reply Last reply Reply Quote 0
                        • JaredBuschJ
                          JaredBusch
                          last edited by

                          By default it does not work unless someone goes into this hard to find setting and populates it.

                          If you dial into my voicemail with my password and hit option 3 for advanced options, the only valid choice is option 5 to leave a message for another extension. There is no way to break out of it. Hitting option 4 kicks it back to the initial mailbox menu.

                          0_1542293151001_2dfdc20c-8be4-4cc9-ad2c-bfc2a267fb30-image.png

                          scottalanmillerS 1 Reply Last reply Reply Quote 1
                          • scottalanmillerS
                            scottalanmiller @JaredBusch
                            last edited by

                            @JaredBusch that's what I thought. As I look at our systems, none seem to have any susceptibility to this kind of attack. Maybe Cisco doesn't out of the box and someone enabled this ridiculousness? That seems unlikely, but who knows.

                            1 Reply Last reply Reply Quote 2
                            • FATeknollogeeF
                              FATeknollogee
                              last edited by FATeknollogee

                              For me, I do auto funding but only in the range of $50-80 per hit.
                              This way I get alerts on my iPhone from my c/c every time a VOIP replenish charge goes through.

                              I also have International calls disabled.

                              1 Reply Last reply Reply Quote 0
                              • 1
                              • 2
                              • 3
                              • 2 / 3
                              • First post
                                Last post