Re: [asterisk-users] fraud advice

2010-10-18 Thread SIP
  On 10/14/10 9:10 PM, Jeff LaCoursiere wrote:
 Hi,

 Embarrassed as I am to write this, I am hoping for some advice.  One of
 our very first PBX installs, now six years old, was taken advantage of
 over the past few weeks.  A victim of sipvicious, I assume, that managed
 to guess one of the SIP passwords.  4000 calls to various middle eastern
 destinations have been placed, which ended up being sent over our
 customer's PSTN trunk, and of course there was no warning until the bill
 came today.  Unfortunately the bill only covered the first few days of
 this fiasco, and was only $700.  I am afraid the one that is on the way
 will be tens of thousands.  ONE CALL on the bill that just arrived was
 $200 (80 minutes to Sierra Leone).

 I'm sure this started out as a single scan.  It must have been posted,
 because I have at least ten IP addresses now that were placing calls via
 the same peer.  They are from all over the world.

 So what is the accepted procedure?  I'm in the US Virgin Islands, so do I
 go to the FBI?  Police?  Is their some telecom fraud body to report such
 things to?  Does any one ever get any relief from such events?

 I'm basically sick to my stomach right now.

 j

We were hit several times in our early days with PRS fraud that ended up 
costing us DEARLY. We contacted the FBI, but they were completely 
unhelpful. The origin of the caller was Egypt (using a network in Egypt 
that has long been a front for criminal activity, so the networking 
people on that end were less than useless), and the Egyptian cyber fraud 
division is two guys with a yahoo email address. The FBI contacted them, 
but they were neither equipped nor entirely willing to be of any real 
help in tracking down the perpetrator. It doesn't hurt to contact the 
FBI, though. They may already have an open investigation into the 
individual or group responsible and need the information for their case. 
But do not expect them to be able to do much.

Eventually, some of our debt was quashed by the provider who had 
violated their own policies in charging us for unlisted premium rate 
services, but it changed the entire way we do business.

Unfortunately, it's now MUCH more difficult to pay us money than it used 
to be, and that's turned a lot of customers off, but we've had no 
problems with PRS fraud since.


N.

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] fraud advice (Also advice on using ipbanning)

2010-10-17 Thread --[ UxBoD ]--

- Original Message -


When we designed our systems on asterisk we designed it to me multi-tenant. Se 
we use customer prefixes on all extensions. This allows us to have multiple 
customers using the same extension pools. It also reduces the hack foot print 
as hackers must know the prefix for a customer to try and brute force things. 
All passwords use 8+ characters with alfa/numeric and special characters. 

As I see it Asterisk does very good keeping out the hackers if you use a solid 
design in your peer and dialplans. At the least put an alpha character post or 
pre other wise you are just asking for it. Use your head you can be smarter 
then they are. 

We are looking into ipban as well. If any one has an example of ipban I would 
love to see how best to implement it. In a 4 year period we have not had a 
breach but we do get about 10 to 15 hack attempts a week. We have blocking 
scripts that block ip's at the primary firewall but I would like to trigger the 
ipban at each switch level. Could I also use the ipban method to trigger the 
audo updates to our primary firewalls? Any advice is appreciated. 


Bryant 



You could also use OSSEC http://www.ossec.net and a custom decoder and rule: 

decoder name=local-asterisk-denied 
prematchNOTICE[\d+] \S+: Registration from /prematch 
regex offset=after_prematch^\S+ failed for '(\d+.\d+.\d+.\d+)'/regex 
ordersrcip/order 
/decoder 

rule id=110005 level=5 
decoded_aslocal-asterisk-denied/decoded_as 
descriptionAsterisk Potentially Under Attack/description 
/rule 

rule id=110006 level=10 frequency=5 timeframe=10 
if_matched_sid110005/if_matched_sid 
same_source_ip / 
descriptionAsterisk Under Brute Force Attack/description 
/rule 
-- 
Thanks, Phil 
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] fraud advice (Also advice on using ipbanning)

2010-10-16 Thread Bryant Zimmerman
When we designed our systems on asterisk we designed it to me multi-tenant. 
Se we use customer prefixes on all extensions. This allows us to have 
multiple customers using the same extension pools. It also reduces the hack 
foot print as hackers must know the prefix for a customer to try and brute 
force things. All passwords use 8+ characters with alfa/numeric and special 
characters. 

As I see it Asterisk does very good keeping out the hackers if you use a 
solid design in your peer and dialplans. At the least put an alpha 
character post or pre other wise you are just asking for it.  Use your head 
you can be smarter then they are.

We are looking into ipban as well. If any one has an example of ipban I 
would love to see how best to implement it.  In a 4 year period we have not 
had a breach but we do get about 10 to 15 hack attempts a week. We have 
blocking scripts that block ip's at the primary firewall but I would like 
to trigger the ipban at each switch level. Could I also use the ipban 
method to trigger the audo updates to our primary firewalls? Any advice is 
appreciated. 

 Bryant


 From: Steve Totaro stot...@totarotechnologies.com
Sent: Friday, October 15, 2010 11:22 AM
To: Asterisk Users Mailing List - Non-Commercial Discussion 
asterisk-users@lists.digium.com
Subject: Re: [asterisk-users] fraud advice

On Fri, Oct 15, 2010 at 10:29 AM, Steve Edwards
asterisk@sedwards.com wrote:
 On Thu, 14 Oct 2010, bruce bruce wrote:

 But it also sickens me at how badly Asterisk is made to not cope with
 situations like this and worse than that is FreePBX.

 Kind of like blaming the gun manufacturer instead of the criminal with
 their finger on the trigger?

 Is there some gaping hole in Asterisk security or are you just asleep at
 the wheel?

 --
 Thanks in advance,
 
-
 Steve Edwards   sedwa...@sedwards.com  Voice: +1-760-468-3867 
PST
 Newline  Fax: 
+1-760-731-3000


This is nothing new. Trunk to trunk transfers and other exploits
could be used on old school phone systems to do the same thing.

I would start with getting the current balance, if over $10k call the
FBI, call them anyways, it couldn't hurt. You want the Feds to check
things out before local police if possible.

Gather as much info as possible, along with police and FBI case
numbers and then call the carrier and see what can be done.

A friend of mine took what was supposed to be my one month rotation to
Iraq. I had too much going on to be in Iraq for a month and a half
and had taken the last rotation so it wasn't even my turn.

The phone bill came for his cell (company provided on Asia Cell) for
$4k in just a couple weeks. It turns out that he was not using the
cell and one of the cleaning people stole his SIM.

After contacting Asia Cell a few times about the matter, they credited
the whole amount back. So you never know.

As for security, I assume you need to allow these extensions to
register from outside the LAN? If not, then only allow them to
register via a LAN IP, I would do it with iptables, only allow the
provider IP through.

I am curious what your user:pass was? something like 1000:1000, I see
many systems setup like this and am surprised they haven't been hit
yet.

In the future, you could use a scheme that makes it much more secure
and also pretty easy to maintain.

The username could be the MAC and the pass could be the serial number
or asset tags if you use them.

I know there must be dozens of people reading this that have had the
same issue but are embarrassed to speak up.

(BTW Sierra Leone is in West Africa, not the Middle East.)

Thanks,
Steve T

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
http://lists.digium.com/mailman/listinfo/asterisk-users


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] fraud advice

2010-10-15 Thread Steve Edwards
On Thu, 14 Oct 2010, bruce bruce wrote:

 But it also sickens me at how badly Asterisk is made to not cope with 
 situations like this and worse than that is FreePBX.

Kind of like blaming the gun manufacturer instead of the criminal with 
their finger on the trigger?

Is there some gaping hole in Asterisk security or are you just asleep at 
the wheel?

-- 
Thanks in advance,
-
Steve Edwards   sedwa...@sedwards.com  Voice: +1-760-468-3867 PST
Newline  Fax: +1-760-731-3000

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] fraud advice

2010-10-15 Thread Zeeshan Zakaria
For future I would highly recommend to have at least fail2ban installed.
This way sipvicous IPs will be blocked instantly before they could create
any damage. Also I prefer to limit International calling to only certain
limit, e.g. only for $10 per account, but this depends upon how your
business deals with international calls. I get a few IPs blocked everyday by
fail2ban, though by default no new connections are allowed international
calls on my system.

Zeeshan A Zakaria

--
www.ilovetovoip.com

On 2010-10-15 10:40 AM, Steve Edwards asterisk@sedwards.com wrote:

On Thu, 14 Oct 2010, bruce bruce wrote:

 But it also sickens me at how badly Asterisk is made to n...
Kind of like blaming the gun manufacturer instead of the criminal with
their finger on the trigger?

Is there some gaping hole in Asterisk security or are you just asleep at
the wheel?

--
Thanks in advance,
-
Steve Edwards   sedwa...@sedwards.com  Voice: +1-760-468-3867 PST
Newline  Fax: +1-760-731-3000

--

_
-- Bandwidth and Colocation Pr...
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] fraud advice

2010-10-15 Thread Steve Totaro
On Fri, Oct 15, 2010 at 10:29 AM, Steve Edwards
asterisk@sedwards.com wrote:
 On Thu, 14 Oct 2010, bruce bruce wrote:

 But it also sickens me at how badly Asterisk is made to not cope with
 situations like this and worse than that is FreePBX.

 Kind of like blaming the gun manufacturer instead of the criminal with
 their finger on the trigger?

 Is there some gaping hole in Asterisk security or are you just asleep at
 the wheel?

 --
 Thanks in advance,
 -
 Steve Edwards       sedwa...@sedwards.com      Voice: +1-760-468-3867 PST
 Newline                                              Fax: +1-760-731-3000


This is nothing new.  Trunk to trunk transfers and other exploits
could be used on old school phone systems to do the same thing.

I would start with getting the current balance, if over $10k call the
FBI, call them anyways, it couldn't hurt.  You want the Feds to check
things out before local police if possible.

Gather as much info as possible, along with police and FBI case
numbers and then call the carrier and see what can be done.

A friend of mine took what was supposed to be my one month rotation to
Iraq.  I had too much going on to be in Iraq for a month and a half
and had taken the last rotation so it wasn't even my turn.

The phone bill came for his cell (company provided on Asia Cell) for
$4k in just a couple weeks.  It turns out that he was not using the
cell and one of the cleaning people stole his SIM.

After contacting Asia Cell a few times about the matter, they credited
the whole amount back.  So you never know.

As for security, I assume you need to allow these extensions to
register from outside the LAN?  If not, then only allow them to
register via a LAN IP, I would do it with iptables, only allow the
provider IP through.

I am curious what your user:pass was?  something like 1000:1000, I see
many systems setup like this and am surprised they haven't been hit
yet.

In the future, you could use a scheme that makes it much more secure
and also pretty easy to maintain.

The username could be the MAC and the pass could be the serial number
or asset tags if you use them.

I know there must be dozens of people reading this that have had the
same issue but are embarrassed to speak up.

(BTW Sierra Leone is in West Africa, not the Middle East.)

Thanks,
Steve T

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] fraud advice

2010-10-15 Thread Matt Desbiens
We took a pretty nasty hit one time, a system administrator didnt listen to
us about changing the passwords.  Luckily they took part of the blame in
that, and we split the 1800$ it cost us in half.  We could have changed
them, and she didnt change them, so we were both at fault.

Like said previously, fail2ban is a pretty good start.  Weak secrets
definitely dont help.

An interesting project to look into and i'm working with right now, i've got
a honeypot set up in the wild, but havent gotten anything really worth while
yet...

http://www.infiltrated.net/voipabuse/defensive.html

I'd also suggest, if you dont *have* to have international dialing on the
trunk.  Turn it off, put a pin on it, or just send it to a dummy trunk that
doesnt do anything or route anywhere.

I really hope this helps, and best of luck with cleaning up from the
aftermath.  I know ours was a pretty good wake up call to us to really start
locking things down.

I know its lame, but from Network Security Hacks.

Security isn't a noun, it's a verb; not a product, but a process
--Matt


On Fri, Oct 15, 2010 at 11:50 AM, Jeff LaCoursiere j...@sunfone.com wrote:

 On Fri, 2010-10-15 at 11:20 -0400, Steve Totaro wrote:

  This is nothing new.  Trunk to trunk transfers and other exploits
  could be used on old school phone systems to do the same thing.
 
  I would start with getting the current balance, if over $10k call the
  FBI, call them anyways, it couldn't hurt.  You want the Feds to check
  things out before local police if possible.
 
  Gather as much info as possible, along with police and FBI case
  numbers and then call the carrier and see what can be done.
 
  A friend of mine took what was supposed to be my one month rotation to
  Iraq.  I had too much going on to be in Iraq for a month and a half
  and had taken the last rotation so it wasn't even my turn.
 
  The phone bill came for his cell (company provided on Asia Cell) for
  $4k in just a couple weeks.  It turns out that he was not using the
  cell and one of the cleaning people stole his SIM.
 
  After contacting Asia Cell a few times about the matter, they credited
  the whole amount back.  So you never know.
 
  As for security, I assume you need to allow these extensions to
  register from outside the LAN?  If not, then only allow them to
  register via a LAN IP, I would do it with iptables, only allow the
  provider IP through.
 
  I am curious what your user:pass was?  something like 1000:1000, I see
  many systems setup like this and am surprised they haven't been hit
  yet.
 
  In the future, you could use a scheme that makes it much more secure
  and also pretty easy to maintain.
 
  The username could be the MAC and the pass could be the serial number
  or asset tags if you use them.
 
  I know there must be dozens of people reading this that have had the
  same issue but are embarrassed to speak up.
 

 Thanks Steve - that is the kind of advice I was looking for.  I'm
 willing to take my lumps for the weak passwords on those accounts, and
 the lack of any filtering.  I do understand the issues and the steps I
 need to take to better secure the switches in service, and just need to
 get off my a$$ and do it.

 Mainly I am hoping to hear from someone who has gone through the
 aftermath - as you mention above.  So far I have had a discussion with
 the carrier who is opening an investigation.  I'll contact the FBI
 today as well.  I'll send an update when this is all over for posterity.


  (BTW Sierra Leone is in West Africa, not the Middle East.)
 

 True ;)  Most of the calls were Iraq, UAE, Lebanon... Found another one
 today that was 2.5 DAYS long to Chile.  Bizarre.

 j



 --
 _
 -- Bandwidth and Colocation Provided by http://www.api-digital.com --
 New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

 asterisk-users mailing list
 To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Re: [asterisk-users] fraud advice

2010-10-15 Thread Steve Totaro
On Fri, Oct 15, 2010 at 11:50 AM, Jeff LaCoursiere j...@sunfone.com wrote:
snipped


 (BTW Sierra Leone is in West Africa, not the Middle East.)


 True ;)  Most of the calls were Iraq, UAE, Lebanon... Found another one
 today that was 2.5 DAYS long to Chile.  Bizarre.

 j


Not bizarre at all.  You being in the Virgin Islands should know what
that is probably about.

http://www.snopes.com/fraud/telephone/809.asp

I have a general questionnaire prior to planning the installation.
One question is about international calls and using a PIN
(Authenticate(1234356)), totally blocking, having a few phones in a
separate context that can dial international.

Usually, I will explain the nature of an IP PBX and the dangers of
fraud, then go over what they NEED.  If you do this along with
locking things down, hopefully you won't run into any more fraud, but
as you have seen first hand, there is big money to be made, so assume
you are defending against an international crime ring with lots of
time and knowledge.

Once you do your bit and cover your bases, then if there is fraud, you
save face and provide guidance rather than damage control.

http://www.infiltrated.net/asterisk-ips.html found that link while
looking googling for Nufone.  It appears there is may be more to the
story than I knew.  I know JerJer claimed to have received a bill for
$500k due to fraud.  I am not sure what happened after that but I am
seeing information about charges against him for mail fraud.

Thanks,
Steve T

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] fraud advice

2010-10-15 Thread Carlos Chavez
On Fri, 2010-10-15 at 07:29 -0700, Steve Edwards wrote:
 On Thu, 14 Oct 2010, bruce bruce wrote:
 
  But it also sickens me at how badly Asterisk is made to not cope with 
  situations like this and worse than that is FreePBX.
 
 Kind of like blaming the gun manufacturer instead of the criminal with 
 their finger on the trigger?
 
 Is there some gaping hole in Asterisk security or are you just asleep at 
 the wheel?
 
Asterisk is just doing what you tell it to do, process calls.  If you
have no authentication or route blocking how do you expect Asterisk to
know that there is a problem?

I was just in a similar situation where someone guessed the username
and password of my SIP trunk.  The provider called me the next day to
tell me that they detected strange traffic on my line and asked if I was
making those calls.  Now that is good service from a provider.


-- 
Telecomunicaciones Abiertas de México S.A. de C.V.
Carlos Chávez Prats
Director de Tecnología
+52-55-91169161 ext 2001


signature.asc
Description: This is a digitally signed message part
-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

[asterisk-users] fraud advice

2010-10-14 Thread Jeff LaCoursiere

Hi,

Embarrassed as I am to write this, I am hoping for some advice.  One of 
our very first PBX installs, now six years old, was taken advantage of 
over the past few weeks.  A victim of sipvicious, I assume, that managed 
to guess one of the SIP passwords.  4000 calls to various middle eastern 
destinations have been placed, which ended up being sent over our 
customer's PSTN trunk, and of course there was no warning until the bill 
came today.  Unfortunately the bill only covered the first few days of 
this fiasco, and was only $700.  I am afraid the one that is on the way 
will be tens of thousands.  ONE CALL on the bill that just arrived was 
$200 (80 minutes to Sierra Leone).

I'm sure this started out as a single scan.  It must have been posted, 
because I have at least ten IP addresses now that were placing calls via 
the same peer.  They are from all over the world.

So what is the accepted procedure?  I'm in the US Virgin Islands, so do I 
go to the FBI?  Police?  Is their some telecom fraud body to report such 
things to?  Does any one ever get any relief from such events?

I'm basically sick to my stomach right now.

j

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] fraud advice

2010-10-14 Thread Cary Fitch
As a practical matter, on anything that can generate endless billings, there
should be a dumb trap that compares current usage to history (last month)
and if usage exceeds 2/1 or 3/1 for instance then usage is choked or denied
enough to cause the user to complain or perhaps generate a message to call
customer support, (or call your cell phone!)

Then if it is valid, raise last month's reference enough to let current
calling continue.  If it isn't valid you have found a problem and saved your
or your customer's caboose.

As to who to complain to, gather all info possible and report to everyone
you can find.  Someone may investigate, but there isn't likely anyone who
will absolve the problem.  Some will just take the report and ... as far as
you are concerned, do nothing.  There isn't much a local police dept. can do
about a hacker in Western Slobovia cracking your server.

Generally the FBI doesn't take matters of less than $10,000.  But it sounds
like you may meet that test.

But they could take months or years or never finding the culprit and finding
the culprit will likely net you nothing financial for you will be 1/10,000
of the fraud they did.

This is a problem like spam in email.  But this has cash costs to the server
operator/customer.  Passwords need to be un-crack-able, and there should be
usage alarms, as described above.

Depending on the situation even a single counter to your upstream billable
sip server for all usage would likely trip on excessive usage and save your
bacon. 


Cary Fitch





-Original Message-
From: asterisk-users-boun...@lists.digium.com
[mailto:asterisk-users-boun...@lists.digium.com] On Behalf Of Jeff
LaCoursiere
Sent: Thursday, October 14, 2010 8:11 PM
To: asterisk-users@lists.digium.com
Subject: [asterisk-users] fraud advice


Hi,

Embarrassed as I am to write this, I am hoping for some advice.  One of 
our very first PBX installs, now six years old, was taken advantage of 
over the past few weeks.  A victim of sipvicious, I assume, that managed 
to guess one of the SIP passwords.  4000 calls to various middle eastern 
destinations have been placed, which ended up being sent over our 
customer's PSTN trunk, and of course there was no warning until the bill 
came today.  Unfortunately the bill only covered the first few days of 
this fiasco, and was only $700.  I am afraid the one that is on the way 
will be tens of thousands.  ONE CALL on the bill that just arrived was 
$200 (80 minutes to Sierra Leone).

I'm sure this started out as a single scan.  It must have been posted, 
because I have at least ten IP addresses now that were placing calls via 
the same peer.  They are from all over the world.

So what is the accepted procedure?  I'm in the US Virgin Islands, so do I 
go to the FBI?  Police?  Is their some telecom fraud body to report such 
things to?  Does any one ever get any relief from such events?

I'm basically sick to my stomach right now.

j

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users


Re: [asterisk-users] fraud advice

2010-10-14 Thread bruce bruce
Jeff,

I suggest talking to your PSTN/VoIP provider. We had a large amount going
through TATA communications and have not accepted their word for payment
because they had a duty to not allow traffic if our credit went down to $1k
while the calls charged were actually more than that.

Unfortunately, probably there is no one you can complain to. But it also
sickens me at how badly Asterisk is made to not cope with situations like
this and worse than that is FreePBX.

I suggest checking your contract terms with your provider as they might have
some sort of restrictions. At the very least PSTN providers try to bring the
price per minute lowered to their buy rate which is usually less than half
of the original bill.

Regards,
Bruce

On Thu, Oct 14, 2010 at 9:10 PM, Jeff LaCoursiere j...@sunfone.com wrote:


 Hi,

 Embarrassed as I am to write this, I am hoping for some advice.  One of
 our very first PBX installs, now six years old, was taken advantage of
 over the past few weeks.  A victim of sipvicious, I assume, that managed
 to guess one of the SIP passwords.  4000 calls to various middle eastern
 destinations have been placed, which ended up being sent over our
 customer's PSTN trunk, and of course there was no warning until the bill
 came today.  Unfortunately the bill only covered the first few days of
 this fiasco, and was only $700.  I am afraid the one that is on the way
 will be tens of thousands.  ONE CALL on the bill that just arrived was
 $200 (80 minutes to Sierra Leone).

 I'm sure this started out as a single scan.  It must have been posted,
 because I have at least ten IP addresses now that were placing calls via
 the same peer.  They are from all over the world.

 So what is the accepted procedure?  I'm in the US Virgin Islands, so do I
 go to the FBI?  Police?  Is their some telecom fraud body to report such
 things to?  Does any one ever get any relief from such events?

 I'm basically sick to my stomach right now.

 j

 --
 _
 -- Bandwidth and Colocation Provided by http://www.api-digital.com --
 New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

 asterisk-users mailing list
 To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

-- 
_
-- Bandwidth and Colocation Provided by http://www.api-digital.com --
New to Asterisk? Join us for a live introductory webinar every Thurs:
   http://www.asterisk.org/hello

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users