eCommerceNews New Zealand - Technology news for digital commerce decision-makers
Story image
Wed, 1st Dec 2010
FYI, this story is more than a year old

You may be confident that your computer system is secure from intruders, but have you ever thought about your phones?More businesses are switching to internet-based, or VoIP, services these days and many don’t realise that VoIP systems, if not properly secured, can be hacked. "Once you’ve got access to the company’s network, then you can often eavesdrop on phone calls, harvest voicemail, make free calls; you can even impersonate people,” says John McColl, consultant for Security-assessment.com. The easiest way into a company’s VoIP phone system for a hacker, is through the port used by the session initiation protocol (SIP) to initiate calls. That port, numbered 5060, is the one hackers look for and if it is left open, it’s tantamount to inviting them in.The most common form of abuse of hacked VoIP systems comes through premium (especially long-distance) phone calls. Businesses often don’t discover these intrusions until they receive their phone bill. Australian network companies have told of clients getting bills for $100,000 worth of unauthorised calls placed over compromised VoIP servers. Access codes are also fetching big money on the black market; a single code can be on-sold numerous times, at around $US100 a pop.But the potential for industrial espionage through phone hacking is obvious. "If I wanted to find out trade secrets I’d hack your VoIP,” says McColl. Imagine the damage that could be done if a hacker tapped into an important meeting being conducted by audio or video conference. Such hacking could even compromise a building’s security. The hacker could call the security desk, telling the guard to let certain people in. The guard sees only the extension name and number of the caller, which looks genuine because the hacker has logged into the system as a legitimate user.Skype calls are generally encrypted, so they don’t pose such a big security risk, but open source systems like Asterisk need special protection. ‘Soft phones’ that work through PCs are another point of vulnerability. To protect your phone system, you need a complete strategy. If staff are required to enter a password or PIN number to make their phones work, make sure they are not easy to guess (some businesses just leave the extension number as the PIN). To protect Port 5060, your server’s firewall needs to know who has access to it. Your VoIP service provider should be the only authorised user. An added protection is to give your provider each individual phone’s media access control (MAC) address (this is usually printed on the back of the phone).