VOIP hacker talks: Service provider nets easy pickings

Common attacks worked for duo that stole $1 million worth of voice minutes

A combination of simple dictionary and brute-force attacks in combination with Google hacking enabled a criminal pair to break into VOIP-provider networks and steal US$1 million worth of voice minutes, says one of the duo who has pleaded guilty to his crimes.

Had his victims observed security basics, most of the attacks would have been unsuccessful, says Robert Moore, the 23-year-old hacker from Spokane, Washington, who has been sentenced to two years in federal prison and fined US$150,000.

In the interest of corporate telecom executives that want to lock down their VOIP networks, Moore reveals his methods in a podcast interview with Telecom Junkies at thevoicereport.com.

Moore says he wrote generic software to run brute-force attacks against Cisco XM routers and Quintum Tenor voice gateways to gain access to them so he could route calls through them. These devices were located in business networks, and calls were routed through them to mask that they came from gear owned by the mastermind behind Moore's activity, Edwin Pena.

Pena was arrested last year along with Moore, but after posting bail fled the country and has not been caught.

Moore also conducted brute-force attacks against service provider networks in order to discover valid prefixes to let calls into their networks.

He designed software to generate 400 prefixes per second against the carrier gear, scanning all the combinations between 000 and 999 randomly to throw off intrusion-detection systems (IDS) that might pick up a sequential attack, Moore says. The attacks were made against VOIP gateways using the H.323 signaling protocol, but not those using SIP, he says.

The pair also scanned known corporate IP addresses for machines that might be vulnerable to their attacks, Moore says. Pena purchased a 2GB database of corporate IP addresses and their subnet ranges for US$800, he says.

"The way we got into them is that most of the telecom administrators were using the most basic password - Cisco, Cisco or admin, admin. They weren't hardening their boxes at all," Moore says.

Pena and Moore found many devices on the Internet with exposed SNMP ports that allowed probing for private information. "There were various object identifiers in the management database that would allow you to see critical information on a Cisco [router], like maybe [the] gateway where it's routing to so we would know where to choose our target," he says.

The object identifiers also helped them identify exactly what make and model machine they had found, and they used that information to research vulnerabilities those machines are known to have so they could exploit them, he says.

He also wrote search strings that he fed into Google seeking exposed Web interfaces on devices, and that proved fruitful as well. "It was really easy actually to launch these things from Google to find these peoples' switches," Moore says.

Dan York, a director of the VOIP Security Alliance who participated in the Moore interview, says standard best practices would thwart Moore's and Pena's tactics. "The attacks were relatively simple attacks that could have been prevented by IT Security 101," he says.

For instance, brute-force prefix searches could be headed off limiting numbers of logon attempts and timing out attempts after a set period. Closing up unused ports of Internet-exposed devices would reduce the chances of being probed, he says.

York also suggests businesses use attack tools published by VOIPSA to test individual VOIP networks for weaknesses.

Moore says Pena initially approached him to develop such tools allegedly to test his own network. Later, it became clear Pena was involved in illegal activity, but Moore continued to work for him because the money was good. He says he wanted to use the proceeds to pay medical bills for his parents who had cancer and lupus.

He says he was paid US$23,000.

Pena is charged with setting up a VOIP wholesaling business that routed calls from his customer's networks onto the networks of VOIP carriers that he and Moore had been able to compromise. Prosecutors said he took in more than $1 million from his customers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Tim Greene

Network World
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?