Maybe we should have a session on how-to securing your asterisk or trixbox from similar or as matter of fact any exploit attempts. I would definetly read some documentation on this, or step by step guide - however this is always a trade off - security over functionality - or functionality over security...

I would not be interested on securing it from the internet side - I think I am pretty good with that - what I be interested is securing it from the telephone network side. What if somebody knows some dialtone sequence and they can make calls through your lines? Remember the days when they whistled codes into the public phones to make free long distance calls...



----- Original Message ----- From: "Dave Donovan" <[EMAIL PROTECTED]>
To: "asterisk" <[email protected]>
Sent: Friday, January 05, 2007 2:03 PM
Subject: [on-asterisk] Shady but insanely profitable


I just read this blurb about a couple of guys that were sentenced in
Germany for using Malware dialers with premium-rate numbers (976
sytle).  They brought in $16m in 15 months.

There are several variations on this type of toll scam.  From the
article, it doesn't look like this one used Asterisk but it goes to
show you how it could be used on the back end.  And, it's a lesson to
those who don't protect their boxes from toll fraud.  If people like
this can make calls from your box, they can drain your pockets at a
rate of more than $15/line/min.

http://www.itcinstitute.com/display.aspx?id=2855

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Reply via email to