Story image

The perils of VoIP

01 Dec 10

You may be confident that your computer system is secure from intruders, but have you ever thought about your phones?
More businesses are switching to internet-based, or VoIP, services these days and many don’t realise that VoIP systems, if not properly secured, can be hacked. "Once you’ve got access to the company’s network, then you can often eavesdrop on phone calls, harvest voicemail, make free calls; you can even impersonate people,” says John McColl, consultant for
The easiest way into a company’s VoIP phone system for a hacker, is through the port used by the session initiation protocol (SIP) to initiate calls. That port, numbered 5060, is the one hackers look for and if it is left open, it’s tantamount to inviting them in.
The most common form of abuse of hacked VoIP systems comes through premium (especially long-distance) phone calls. Businesses often don’t discover these intrusions until they receive their phone bill. Australian network companies have told of clients getting bills for $100,000 worth of unauthorised calls placed over compromised VoIP servers. Access codes are also fetching big money on the black market; a single code can be on-sold numerous times, at around $US100 a pop.
But the potential for industrial espionage through phone hacking is obvious. "If I wanted to find out trade secrets I’d hack your VoIP,” says McColl. Imagine the damage that could be done if a hacker tapped into an important meeting being conducted by audio or video conference.
Such hacking could even compromise a building’s security. The hacker could call the security desk, telling the guard to let certain people in. The guard sees only the extension name and number of the caller, which looks genuine because the hacker has logged into the system as a legitimate user.
Skype calls are generally encrypted, so they don’t pose such a big security risk, but open source systems like Asterisk need special protection. ‘Soft phones’ that work through PCs are another point of vulnerability.
To protect your phone system, you need a complete strategy. If staff are required to enter a password or PIN number to make their phones work, make sure they are not easy to guess (some businesses just leave the extension number as the PIN).
To protect Port 5060, your server’s firewall needs to know who has access to it. Your VoIP service provider should be the only authorised user. An added protection is to give your provider each individual phone’s media access control (MAC) address (this is usually printed on the back of the phone).

Three ways to improve mental health support in the workplace
“Instead of scrambling into action after a crisis, employers need to be more proactive in supporting employees."
Samsung joins a global league of AI experts
“As a member of the PAI, Samsung will strive to facilitate the ongoing progress of artificial intelligence.”
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
Kordia launches Women in Tech scholarship at the University of Waikato
The scholarship is established to acknowledge and support up-and-coming female talent and future technology leaders.
Mastercard opens Global Tech Hub in Sydney
"Enterprises, SMEs or startups are now able to bypass legacy approaches and develop innovation at an accelerated pace."
Kiwis concerned about being scammed – survey
This unease is warranted given the growing sophistication of scammers and their activities, and numbers of attempted fraud.
With a mighty roar, Rocket Lab blasts off to space
Success! It definitely was business time for Rocket Lab yesterday as its Electron launch vehicle blasted off from the Māhia Peninsula yesterday (November 11).
Commercial drones will only take off if safety is paramount
New Zealand’s commercial drone services could be ready within the next two years, but only if enough research is done to make certain that the public is safe.