incident response for voice services - first · security impact of voip deployments campus voip...

31
© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved. Incident Response For VOICE Services 13750 San Pedro San Antonio, TX 78232 [email protected] www.securelogix.com Lee Sutterfield President SecureLogix Corporation

Upload: others

Post on 08-Jul-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Incident ResponseFor

VOICE Services

13750 San PedroSan Antonio, TX [email protected]

Lee SutterfieldPresidentSecureLogix Corporation

Page 2: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

The Voice Service has long been a useful and lucrative attack vector into the Enterprise data network.

Voice Firewall technology provides the Enterprise with the other half of

“360 degree” visibility and control over the enterprise electronic perimeter.

Voice Incident Response is increasingly needed to address both the obvious impact to costs and operations of attacks

against the voice service itself and the security risks that rise from the logical and physical

interconnectivity of voice and data services.

Page 3: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Legacy Voice SecurityVoice Firewall Technology Base (circuit switched)

Campus VoIP SecurityIP Trunk SecurityVoice Firewall Technology Base (packet switched)

Incident Response for VOICE Services

Overview

Page 4: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Legacy Voice and Data Network Security

Issues

Page 5: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Voice Service Availability / Theft

Significant increase in reported TOLL FRAUD in the last three years.

ExternalAttack

PSTN

InternetIP-Firewall

Voicemail

PBX

TDM Telephones

Workstations

Servers

ISP

Page 6: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Cross Network Attacks - Authorized Modems

AuthorizedModem

ExternalAttack

PSTN

InternetIP-Firewall

PBX

Servers

ISP

Page 7: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Cross Network Attacks - Unauthorized Modems

Employees use a modem to dial around the Firewall and IDS.

Hacker “piggybacks” off ISP connection to access the Data Network.

ExternalAttack

PSTN

InternetIP-Firewall

PBX

Servers

ISP

UnauthorizedModem

Blocked!

Biggest issue might be re-contamination with malicious software.

Page 8: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Cross Network Attacks – WarDialing

Whitehat Wardialing – 2%-4% of phone lines have unauthorized modems.

ModemExternalAttack

PSTN

InternetIP-Firewall

PBX

Servers

ISP

However, only 20% of UNAUTHORIZED modems detected via Whitehat Wardialing.

Page 9: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Voice Firewall Technology Base

Page 10: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Voice Firewall Deployment in TDM Network

Blocked!

ALERT

ExternalAttack

PSTN

InternetIP-Firewall

PBX

TDM Telephones

Workstations

Servers

ISP

VoiceFirewall

Page 11: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Voice Firewall Core Functionality

Log all Call Progress Information:Source, destination, time, duration, etc…Enterprise-wide, real-time, back to central server

Characterize Call Type:Voice, fax, modem, VTC, STU-III (secure)Continuous monitoring of call for type changes

Generic Security/Management Policy:Rule-based analysis of each callAutonomous executionCentrally managed push-down policy

Also a logical platform to supportPOLICY BASED CALL RECORDING with centralized, near real-time retrieval.

Page 12: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Technology Overview

LAN

Modem

PSTN Trunks

Firewall

Phones

InternetProvider

InternetConnection

Phones

PBXServiceProvider

Switch

Voice Voice FirewallFirewall

Voice Firewall

Voice Firewall:Blocks phone line attacks. Controls voice network access and service use.

Voice IPS:Prevents malicious and abusive call patterns such as toll fraud.

Performance Manager:Enterprise-wide dashboard. Real-time performance monitoring & diagnostics.

Usage Manager:Enterprise-wide, PBX-independent CDR, call accounting, & resource utilization.

Call Recorder:Policy-based recording of targeted calls. Trunk-side, cost effective solution.

Application Suite

Page 13: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Voice Firewallsand

Campus Level VoIP Deployments

Page 14: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

General PurposeOperating System

Network Stack(IP, UDP, TCP)

VoIPProtocols

ServicesTFTP, SNMP,

DHCP, DB,Web Server

Voice Application

Worms/VirusesTargeting The

Operating System

Trivial DoS AttacksMITM Attacks

TFTP Brute Force AttackSNMP Enumeration

DHCP StarvationSQL Attacks

Flood DoSFuzzing

Application Attacks

Poor ConfigurationWeak Passwords

Insecure Management Insecure Architecture

IP PBX Vulnerabilities

Page 15: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

IP PBX

CM

Gateway

DNS

CC Admin

TFTPDHCP

VM

DB

Other CommonServices

DHCPDNS

SNMP

WebServer

RTP

TDMInterfaces

UnderlyingOS

ManagementInterfaces

TFTPSignaling

NetworkStacks

SQL

IP PBX Vulnerabilities

Page 16: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

IP PBX

CM

Gateway

DNS

CC Admin

TFTPDHCP

VM

DB

Eavesdropping ResourceStarvation

PhysicalAttacks

SPITPhishing

TollFraud

Modems

DoSFloods

UnauthorizedAccess

FuzzingDoS

Sniffing

IP PBX Attacks

Page 17: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Campus VoIP Server Security

modem

Workstations

Servers

TDMPhones

IPPhones

CallServerCluster

ExternalAttacker

PSTN

Internet

ISP

IP-Firewall

VoiceFirewall

PBX IPBXgateway

Page 18: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Campus VoIP Server Security

Enterprise-wideReal-timeReporting

Misuse &Toll FraudDetection

modem

Workstations

Servers

TDMPhones

IPPhones

CallServerCluster

ExternalAttacker

PSTN

Internet

ISP

IP-Firewall

VoiceFirewall

PBX IPBXgateway

Page 19: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Campus VoIP Server Security

Firewall

ALERT Blocked

modem

Workstations

Servers

TDMPhones

IPPhones

CallServerCluster

ExternalAttacker

PSTN

Internet

ISP

IP-Firewall

VoiceFirewall

PBX IPBXgateway

InternalAttacker

Page 20: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Security Impact of VoIP Deployments

Campus VoIP deployments have enriched the vulnerability base, increased the target set and

multiplied attack vectors.

However, the level of attacks still appears relatively low because the overall VoIP target set is still comparatively small and not yet connected

directly to the public network.

Page 21: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Voice Fraud in the News

Communications Fraud Control Association’sMarch 2006

“Terrorist organizations embrace communications fraud to generate funds by illegally gaining access to a network and then reselling the service.”http://www.cfca.org/pdf/press/3-28-06PR.pdf

These are only a few out of hundreds of cases!

Businesses Ignore Telecoms Fraud (Huge Losses)July 2008

http://www.networkworld.com/news/2008/072808-businesses-ignore-telecoms.html

BT: Fraudsters Return to Dial Through Fraud/PBX HackingDecember 2008

http://www.networkworld.com/news/2008/072808-businesses-ignore-telecoms.html

Cybercrime Cost Firms $1 Trillion Globally, McAfee Study Says Hacker Makes Costly CallsDecember 2008

http://www.winnipegfreepress.com/local/hacker_makes_costly_calls.html

FEMA Phones Hacked; Calls Made to Mideast, AsiaAugust 2008

http://www.msnbc.msn.com/id/26319201

Page 22: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Still the most comprehensive VoIP Security book on the

market.

Hacking Exposed

Page 23: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Voice Firewallsand

SIP Trunking

Page 24: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

IP Trunk RiskExternal attack through IP Trunks against IP Voice and Data Network

modem

Workstations

Servers

TDMPhones

IPPhones

CallServerCluster

ExternalAttacker

PSTN

Internet

ISP

IP-Firewall

VoiceFirewall

PBX IPBXgateway

IP Trunk Dedicated Voice

Page 25: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

External attack through IP Trunks against IP Voice and Data Network

Real-Time Mixed Media Firewall

PSTN

ALERT Blocked

modem

Workstations

Servers

TDMPhones

IPPhones

CallServerCluster

ExternalAttacker

Internet

ISP

IP-Firewall

VoiceFirewall

PBX IPBXgateway

Real-TimeMixed Media FirewallPolicy Enforcement

Page 26: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

The Point of Protection is at the Edge

SIP is just another protocol! But the VOICE SERVICE is NOT JUST ANOTHER APPLICATION!!

Phone network is still your largest network!!??

Provider/PSTN

Public Edge:Point of Virtual Inter-operability

• T1/E1• ISDN/PRI• Analog• Euro PRI• H.323• SS7• Public SIP

Public Standards— Hackers

— Frauds— Social Engineers— Dial Throughs— Bomb Threats— Tampering— ISP Calls— Harassing Callers— Modems— Fax Spam— Scanners

Proprietary PBX and Gateway

Systems

Nortel

Microsoft

Cisco

Avaya

Siemens

Mitel

Alcatel - Lucent

Asterisk

Ericsson

Unistm

H.323

SCCP

SVP

SIP

Analog

802.11

Digital

MEGACO

Proprietary End Point Elements

Proprietary Protocols

Data

VoiceFirewall

Page 27: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Voice FirewallsImpact

onIncident Response

Page 28: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

1. Voice connections to data network provide near 100% success rate for invisible access to data network resources

2. Voice network connections are relatively slow so they’re usually used to gain unauthorized access but not usually used for target exploitation

3. Once bogus accounts are established the attacker will usually exit the phone connection and enter via the newly established accounts via the data network connection

4. Ongoing exploitation is conducted at normal network speeds untildiscovered

5. If accounts are closed the attacker simply returns to the voice network to gain access again and repeat the above

6. The Enterprise has NO visibility into this exploit without the deployment of VOICE FIREWALL technology

Voice Originated Attack Scenario

Page 29: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Legacy voice network interconnectivity has always been a step-child attack vector for the security community but it has never fallen out of favor with the hacker community

Enterprise security operations and incident response teams are running half blind without addressing VOICE INCIDENT RESPONSE

VoIP deployments exacerbate the problem but Voice Firewall technologyaddresses these new issues as well

Voice network vulnerabilities, such as modem based interconnectivity, are already recognized throughout traditional security best practices and is growing in importance in regulatory and compliance communities

Incident Response for Voice

Page 30: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Voice Incident Categories

Unauthorized modems used for ISP sessions

Remote access (modem) attacks against server farms and PBX’s

Phone service misuse by authorized personnel (Employee and Janitorial Toll Fraud)

Toll Fraud attacks against PBX’s and VoIP Systems

Harassing/Threatening calls against personnel and executive staff

Malicious Software insertion/re-infection via ISP sessions (unauthorized modems)

Vishing attacks - social engineering exploiting call centers (call recording)

Denial of Service attacks via VoIP system vulnerabilities

Bomb threats - need quick call capture, retrieval and dissemination (call recording)

Improve voice uptime via real-time forensics/diagnostics/alerts

Stop data leakage via voice resources

Reduce telecom total cost of ownership - peak utilization rates, outages, etc.

Baseline/plan/optimize new UC/VoIP deployments

Policy-driven recording of targeted calls for compliance, safety and forensics

Page 31: Incident Response For VOICE Services - FIRST · Security Impact of VoIP Deployments Campus VoIP deployments have enriched the vulnerability base, increased the target set and multiplied

© Copyright 1999-2009 SecureLogix Corporation. All Rights Reserved.

Voice Firewall technology addresses age old vulnerabilities

Voice Firewalls provide a lock-down mechanism for containment, eradication and recovery for the other half of the enterprise communications network during malicious software outbreaks andnetwork attacks

Voice Incident Response falls neatly within the construct for traditional incident response practices: preparation; prevention; detection and analysis; containment, eradication, and recovery.

Growing interest from the Enterprise market such that Voice Incident Response is being offered within new Managed Security Services for Voice (MSSVs)

Summary