Story image

The perils of VoIP

01 Dec 2010

You may be confident that your computer system is secure from intruders, but have you ever thought about your phones?More businesses are switching to internet-based, or VoIP, services these days and many don’t realise that VoIP systems, if not properly secured, can be hacked. "Once you’ve got access to the company’s network, then you can often eavesdrop on phone calls, harvest voicemail, make free calls; you can even impersonate people,” says John McColl, consultant for Security-assessment.com. The easiest way into a company’s VoIP phone system for a hacker, is through the port used by the session initiation protocol (SIP) to initiate calls. That port, numbered 5060, is the one hackers look for and if it is left open, it’s tantamount to inviting them in.The most common form of abuse of hacked VoIP systems comes through premium (especially long-distance) phone calls. Businesses often don’t discover these intrusions until they receive their phone bill. Australian network companies have told of clients getting bills for $100,000 worth of unauthorised calls placed over compromised VoIP servers. Access codes are also fetching big money on the black market; a single code can be on-sold numerous times, at around $US100 a pop.But the potential for industrial espionage through phone hacking is obvious. "If I wanted to find out trade secrets I’d hack your VoIP,” says McColl. Imagine the damage that could be done if a hacker tapped into an important meeting being conducted by audio or video conference. Such hacking could even compromise a building’s security. The hacker could call the security desk, telling the guard to let certain people in. The guard sees only the extension name and number of the caller, which looks genuine because the hacker has logged into the system as a legitimate user.Skype calls are generally encrypted, so they don’t pose such a big security risk, but open source systems like Asterisk need special protection. ‘Soft phones’ that work through PCs are another point of vulnerability. To protect your phone system, you need a complete strategy. If staff are required to enter a password or PIN number to make their phones work, make sure they are not easy to guess (some businesses just leave the extension number as the PIN). To protect Port 5060, your server’s firewall needs to know who has access to it. Your VoIP service provider should be the only authorised user. An added protection is to give your provider each individual phone’s media access control (MAC) address (this is usually printed on the back of the phone).

Orange Belgium opens 1,000 sqm Antwerp data centre
It consists of more than 500 high-density 52 unit racks, installed on the equivalent of 12 tennis courts.
Time to build tech on the automobile, not the horse and cart
Nutanix’s Jeff Smith believes one of the core problems of businesses struggling to digitally ‘transform’ lies in the infrastructure they use, the data centre.
Cloud providers increasingly jumping into gaming market
Aa number of major cloud service providers are uniquely placed to capitalise on the lucrative cloud gaming market.
Intel building US’s first exascale supercomputer
Intel and the Department of Energy are building potentially the world’s first exascale supercomputer, capable of a quintillion calculations per second.
NVIDIA announces enterprise servers optimised for data science
“The rapid adoption of T4 on the world’s most popular business servers signals the start of a new era in enterprise computing."
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
Storage is all the rage, and SmartNICs are the key
Mellanox’s Kevin Deierling shares the results from a new survey that identifies the key role of the network in boosting data centre performance.
Opinion: Moving applications between cloud and data centre
OpsRamp's Bhanu Singh discusses the process of moving legacy systems and applications to the cloud, as well as pitfalls to avoid.