VoIP Fraud Analysis. Simwood esms Limited https://www.simwood.com/ @simwoodesms Tel: 029 2120 2120



Similar documents
Three-Way Calling using the Conferencing-URI

AGILE SIP TRUNK IP-PBX Connection Manual (Asterisk)

TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series

Storming SIP Security Captions

SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, Dennis Baron, January 5, 2005 Page 1. np119

Asterisk with Twilio Elastic SIP Trunking Interconnection Guide using Secure Trunking (SRTP/TLS)

AGILE SIP TRUNK IP- PBX Connection Manual (Asterisk, Trixbox)

PORTA ONE. Porta Switch. Handbook: Residential VoIP Services Maintenance Release 24.

Handbook: Residential VoIP and IP Centrex Services Maintenance Release 23

Grandstream Networks, Inc. GXP2130/2140/2160 Auto-configuration Plug and Play

SIP Trunk 2 IP-PBX User Guide Asterisk. Ver /08/01 Ver /09/17 Ver /10/07 Ver /10/15 Ver1.0.

SIP ALG - Session Initiated Protocol Applications- Level Gateway

PORTA ONE. Porta Switch. Handbook: Residential VoIP Services Maintenance Release 23.

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

IP Office 4.2 SIP Trunking Configuration Guide AT&T Flexible Reach and AT&T Flexible Reach with Business in a Box (SM)

OpenSIPS For Asterisk Users

Hacking Trust Relationships of SIP Gateways

SIP Trunking & Peering Operation Guide

Avaya IP Office 4.0 Customer Configuration Guide SIP Trunking Configuration For Use with Cbeyond s BeyondVoice with SIPconnect Service

JJ Technical Specification on Called Party Subaddress Information Interface between Private SIP Networks. First Edition

Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office Issue 1.0

PORTA ONE. PortaSwitch Handbook: SIP Services Maintenance Release 16. Part I.

IP Office Technical Tip

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

SIP: Session Initiation Protocol. Copyright by Elliot Eichen. All rights reserved.

Voice over IP (SIP) Milan Milinković

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 TEL: # 340

Denial of Services on SIP VoIP infrastructures

NTP VoIP Platform: A SIP VoIP Platform and Its Services

Request for Comments: August 2006

Transparent weaknesses in VoIP

Transbox. User Manual

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

3GPP TS V8.1.0 ( )

For internal circulation of BSNL only

Black Hat Briefings 2007 Las Vegas. White Paper on Vulnerabilities in Dual-mode/Wi-Fi Phones

Media Gateway Controller RTP

VoIP Fundamentals. SIP In Depth

Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling

Session Initiation Protocol (SIP)

SIP for Voice, Video and Instant Messaging

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

Session Initiation Protocol

How To Configure. VoIP Survival. with. Broadsoft Remote Survival

Technical Communication 1201 Norphonic emergency rugged telephone on Alcatel-Lucent OmniPCX Enterprise

2 ports GSM/VoIP PCI Card. User Manual

SIP Introduction. Jan Janak

An Introduction to. Voice over IP Security

BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE Version 1

NTP VoIP Platform: A SIP VoIP Platform and Its Services 1

ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION

SIP Essentials Training

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

ETSI TS V8.2.0 ( ) Technical Specification

Multimedia & Protocols in the Internet - Introduction to SIP

MV-374 / MV-378. VoIP GSM Gateway. User Manual

SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda.

SIP: Protocol Overview

Formación en Tecnologías Avanzadas

VoIP. What s Voice over IP?

MV-372. VoIP GSM Gateway. User Manual

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic

VoIP fraud methods used on the Internet today

How To Understand How Open Source And Free Software Work Together

An outline of the security threats that face SIP based VoIP and other real-time applications

SIP Trunking. Service Guide. Learn More: Call us at

Vulnerabilities in SOHO VoIP Gateways

internet technologies and standards

Hacking / Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions / Endler & Collier / Enumerating a VoIP Network

Session Initiation Protocol (SIP) Chapter 5

The VoIP Vulnerability Scanner

Microsoft s Proposal to the SIP Forum. For SIP Trunking Interoperability

How to make free phone calls and influence people by the grugq

Interoperability between IPv4 and IPv6 SIP User Agents

Enabling Security Features in Firmware DGW v2.0 June 22, 2011

SIP Session Initiation Protocol

Session Initiation Protocol

McGary (43) Pub. Date: Jun. 14, 2007

Advanced Networking Voice over IP & Other Multimedia Protocols

MV-374 / MV-378. VoIP GSM Gateway. User Manual

MOHAMED EL-SHAER Teaching Assistant. Room TASK Exercises Thu., Nov. 17, 2014 CONTENT

Ram Dantu. VOIP: Are We Secured?

VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution

Troubleshooting SIP with Cisco Unified Communications

Mobicents 2.0 The Open Source Communication Platform. DERUELLE Jean JBoss, by Red Hat 138

Monitoring SIP Traffic Using Support Vector Machines

Adaptation of TURN protocol to SIP protocol

MV-370 / MV-372. VoIP GSM Gateway. User Manual

Analysis of a VoIP Attack

How To Use Sip On A Pc Or Mac Or Ipod (For A Premium) For Free On A Sim Sims Or Ipo (For Free) For A Long Distance Connection (For Psp) For Your Ipo Or Ipos

How To Send A Connection From A Proxy To A User Agent Server On A Web Browser On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Webmail Web Browser (For Ipad) On An Ipad Or

Transcription:

VoIP Fraud Analysis Simwood esms Limited https:/// @simwoodesms Tel: 029 2120 2120 Simon Woodhead Managing Director simon.woodhead@simwood.com

INTRODUCTION Wholesale Voice (and fax!)! UK Numbering Termination UK PSTN Virtual Interconnect

INTRODUCTION

INTRODUCTION https:// http://blog.simwood.com

TOLL FRAUD & DIAL THROUGH FRAUD $46bn ( but essentially unlimited )

TOLL FRAUD & DIAL THROUGH FRAUD Operator Carrier Cost Profit Wholesaler Reseller Retailer

TOLL FRAUD & DIAL THROUGH FRAUD Operator Cost Carrier Profit Wholesaler Reseller Loss Retailer

TOLL FRAUD & DIAL THROUGH FRAUD Operator Carrier Wholesaler PRS Outpayment Cost Profit Outpayment Reseller Retailer

TOLL FRAUD & DIAL THROUGH FRAUD Operator PRS Outpayment Cost Carrier Profit Wholesaler Outpayment Reseller Retailer Loss Profit to Fraudster

COMMERCIAL PRESSURE VOICE IS BECOMING A FEATURE, RATHER THAN A SERVICE Billed Minute Revenue Fraud Costs THE WISE MINIMISE RISK, RATHER THAN MAXIMISE THEORETICAL MARGIN

SIMWOOD HONEYPOT 60 minutes in the Simwood Darknet on a Sunday afternoon

SIMWOOD HONEYPOT http://mirror.simwood.com/honeypot

KEY INTRUSION METHODS SIP Scan! Stage 1: Reconnaissance

KEY INTRUSION METHODS SIP SCAN OPTIONS sip:100@xxx.xxx.xxx.xxx SIP/2.0! Via: SIP/2.0/UDP XXX.XXX.XXX.XXX:5151;branch=z9hG4bK-4181329969;rport! Content-Length: 0! From: "sipvicious"<sip:100@1.1.1.1>; tag=6332303064323361313363340132! Accept: application/sdp! User-Agent: friendly-scanner! To: "sipvicious"<sip:100@1.1.1.1>! Contact: sip:100@xxx.xxx.xxx.xxx:5151! CSeq: 1 OPTIONS!

KEY INTRUSION METHODS SIP SCAN 1,800 1,350 900 450 0 2011 2012 2013 Growth in reconnaissance traffic (events by year)

KEY INTRUSION METHODS SIP SCAN Other! 165 UK! 56 Germany! 644 USA! 529 Sources of reconnaissance traffic (12 months)

KEY INTRUSION METHODS SIP SCAN SIP Scan! Stage 2: Scan

KEY INTRUSION METHODS SIP SCAN REGISTER sip:xxx.xxx.xxx.xxx SIP/2.0! To: <sip:1002@xxx.xxx.xxx.xxx>! From: <sip:1002@xxx.xxx.xxx.xxx>;tag=ba255b19! Via: SIP/2.0/UDP XXX.XXX.XXX.XXX:11184;branch=z9hG4bK-d87543-1477;rport! Call-ID: 8f60483ce717142b! CSeq: 1 REGISTER! Contact: <sip:1002@xxx.xxx.xxx.xxx:11184>! Expires: 3600! Max-Forwards: 70! Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, NOTIFY, MESSAGE, SUBSCRIBE! User-Agent: eyebeam release 3006o stamp 17551! Content-Length: 0!

KEY INTRUSION METHODS SIP SCAN 70,000,000 66,991,700 52,500,000 35,000,000 17,500,000 21,855,874 7,206,750 0 2011 2012 2013 Growth in scan traffic (events by year)

KEY INTRUSION METHODS SIP SCAN Republic of Korea! 569,708 Thailand! 2,135,810 Anonymous Proxy! 2,453,447 UK! 2,944,596 USA! 6,194,621 Germany! 47,803,899 Sources of scan traffic (12 months)

KEY INTRUSION METHODS Targeted Exploit

KEY INTRUSION METHODS Autoprovisioning

TRAFFIC INVITE sip:000xxxxxxxxxxxx@xxx.xxx.xxx.xxx SIP/2.0! To: 000XXXXXXXXXXXX<sip:000XXXXXXXXXXXX@XXX.XXX.XXX.XXX>! From: 1000<sip:1000@XXX.XXX.XXX.XXX>;tag=1ba25ae7! Via: SIP/2.0/UDP XXX.XXX.XXX.XXX:5070;branch=z9hG4bK-50489a18;rport! Call-ID: 50489a186c9c2ff6adacfcc8edb55af1! CSeq: 1 INVITE! Contact: <sip:1000@xxx.xxx.xxx.xxx:5070>! Max-Forwards: 70! Allow: INVITE, ACK, CANCEL, BYE.! User-Agent: sipcli/v1.8! Content-Type: application/sdp! Content-Length: 281!! v=0! o=sipcli-session 12278792 2114349621 IN IP4 XXX.XXX.XXX.XXX! s=sipcli! c=in IP4 XXX.XXX.XXX.XXX! t=0 0! m=audio 5072 RTP/AVP 0 101! a=fmtp:101 0-15! a=rtpmap:0 PCMU/8000! a=rtpmap:101 telephone-event/8000! a=sendrecv.

TRAFFIC 70,000 63,353 52,500 35,000 17,500 03,035 2011 17,241 2012 2013 Growth in call traffic (events by year)

TRAFFIC Germany! Netherlands!2,146 2,739 France! 2,864 UK! 3,193 Europe! 4,213 Palestine! 28,795 USA! 12,322 Sources of call traffic (12 months)

TRAFFIC Test Traffic

TRAFFIC Rest of World! Palestine! 2,140 1,341 USA! 2,461 UK! 7,588 Israel! 36,971 Location of test numbers (12 months)

TRAFFIC 25% of test traffic from 2 numbers 50% from the top 10

TRAFFIC Mostly ordinary landline numbers

TRAFFIC Absent from commercial feeds

TRAFFIC Reminder: This is Test Traffic

TRAFFIC The visible attack hasn t yet started

TRAFFIC Live DTF Traffic

SOLUTIONS No-Cost Solutions

SOLUTIONS Bill frequently, monitor continuously

SOLUTIONS Buy with prepayment ( Where they can kill calls in progress when credit exhausted! )

SOLUTIONS Use a carrier with real-time billing & CDRs

SOLUTIONS Use honeypot data http://mirror.simwood.com/honeypot

SOLUTIONS 99.79% of 64m intrusions use the user agent friendly-scanner

SOLUTIONS Use TLS ( Or at least TCP )

SOLUTIONS Avoid autoprovisioning ( Or at least filter by user agent, rate limit and log! )

SOLUTIONS Monitor & control off-net

SOLUTIONS MONITOR & CONTROL OFF-NET Example 1: Value of calls in progress

SOLUTIONS MONITOR & CONTROL OFF-NET

SOLUTIONS MONITOR & CONTROL OFF-NET Max cost per call

SOLUTIONS MONITOR & CONTROL OFF-NET Custom ACL

SOLUTIONS MONITOR & CONTROL OFF-NET Channel limits Overall, international, per destination number & known-hotspots

SOLUTIONS MONITOR & CONTROL OFF-NET Rate limits Overall, international, per destination number & known-hotspots

SOLUTIONS MONITOR & CONTROL OFF-NET Automated alerts

SOLUTIONS MONITOR & CONTROL OFF-NET API control

SOLUTIONS MONITOR & CONTROL OFF-NET All above features are available through the Simwood API today

DOES IT SCALE? 300,000 operations per second can t be wrong!

FINAL THOUGHTS Fraud is the number 1 risk to VoIP businesses.

FINAL THOUGHTS Manage risk not margin. Voice is becoming a feature not a service.

FINAL THOUGHTS Let a competent carrier take the strain.

KEEP IN TOUCH http://blog.simwood.com @simwoodesms Hardcopy in foyer https://simwood.com/kamailio