SIP traffic would run on your internal network? Whereas the attack would come 
from an external source?

How does internal FWing or QOS help here?

Cheers
Ken

From: [email protected] [mailto:[email protected]] On 
Behalf Of Ziots, Edward
Sent: Tuesday, 4 June 2013 11:50 PM
To: [email protected]
Cc: Kurt Buff
Subject: RE: [NTSysADM] TDoS - your new term for the day

The funny part is that SIP based Telephony has been being abused for years ( 
toll fraud, etc etc) and the controls around VOIP traffic are pretty weak since 
hardly anyone ever FW's off the VOIP traffic from the regular network traffic, 
or does proper QOS, which only exacerbates the issue when you get hit with a 
flooding attack,

Z

Edward E. Ziots, CISSP, CISA, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]<mailto:[email protected]>
Work:401-255-2497


This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.
[Description: Description: Lifespan]


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Andrew S. Baker
Sent: Tuesday, June 04, 2013 9:31 AM
To: ntsysadm
Cc: Kurt Buff
Subject: Re: [NTSysADM] TDoS - your new term for the day

The attacker "advantage" of a TDoS is that most organizations have only one 
phone system, or have one for corporate activity vs customer support 
activities, and it is easy to identify which is which.    A DDoS on an 
organization's website might not impact their backoffice operations at all, 
depending upon the network configuration.






ASB
http://XeeMe.com/AndrewBaker<http://xeeme.com/AndrewBaker>
Providing Virtual CIO Services (IT Operations & Information Security) for the 
SMB market...




On Tue, Jun 4, 2013 at 1:00 AM, Kurt Buff 
<[email protected]<mailto:[email protected]>> wrote:
http://www.darkreading.com/attacks-breaches/hacking-the-tdos-attack/240155809

By Kelly Jackson Higgins
Dark Reading
May 30, 2013

When an ICU nurse refused to pay scammers who insisted she owed money
for a payday loan, they unleashed a robo-dial flood of hundreds of
calls per hour that ultimately shut down the phone system of the
hospital's intensive care unit. In another case, supporters of a
popular company that received a negative rating from a major financial
firm voiced their displeasure by crowdsourcing phone calls to the firm
in an attempt to block its trading and other functions -- and they
organized it via a Facebook Event post.

These real-world cases of telephony denial-of-service (TDoS) attacks
in the past year didn't get the publicity that distributed
denial-of-service (DDoS) attacks did, but security experts say these
types of attacks have been on the rise in the past couple of years and
can be just as damaging as a DDoS.

"Personally, I believe that it's a more invasive approach to target a
company's [or] individual's primary means of communication. Just like
DDoS attacks, based on my observations, they tend to abuse the
infrastructure of legitimate services, Skype, ICQ, major U.S-based
carriers, and relevant SIP providers," cybercrime researcher Dancho
Danchev said in an interview via email.

TDoS attacks -- which earlier this year were becoming prevalent enough
that the U.S. Department of Homeland Security issued an alert about a
threat of TDoS attacks on public sector entities in an attempt to
extort money -- are typically similar in motivation and goals as DDoS
attacks that flood networks, websites or other servers with massive
volumes of traffic meant to bring an organization's data structure to
its knees. Call centers are the most popular TDoS targets -- they're
easy to contact and flood with calls -- and, increasingly, there are
more tools readily available tools for launching these attacks on any
organization or individual's location.

[...]


<<inline: image001.jpg>>

Reply via email to