Let me guess…
1. The Switchvox was open to the Internet
2. The extensions were simple (three / four digits) and the passwords matched the extensions
3. The attacker was able to register from the public Internet as one of the users and send the calls.
Sounds much more like an installation done by someone who had no clue about IP security. Don’t blame Switchvox for the installers lack of a clue.. Switchvox is designed to run behind a firewall, and best practices for installation would dictate that you be very paranoid about what to allow to communicate w/ the PBX. Allowing it to be openly accessed on the Public Internet is shear stupidity.
So.. what am I missing here?
From: asterisk-biz-bounces@lists.digium.com [mailto:asterisk-biz-bounces@lists.digium.com] On Behalf Of VIP Carrier
Sent: Saturday, February 07, 2009 6:36 PM
To: Commercial and Business-Oriented Asterisk Discussion
Subject: [asterisk-biz] PBX got Hacked
Guys,
I can't belive that our client's PBX got hacked today.
My client has a SwitchVOX SMB and it got hacked!
some F@ckers with a following IP's
91.121.132.208
69.60.114.222
was able to send a calls in a matter of 1 hr for more then $2000
what can I say stay a way from switchvox
--
This message has been scanned for viruses and
dangerous content by N2Net Mailshield, and is
believed to be clean.
No comments:
Post a Comment