[cisco-voip] Fraud calls to Cuba - Please read

Vince Loschiavo VLoschiavo at data-corporation.com
Thu Jan 8 12:44:00 EST 2009


# whois 124.217.250.240
[Querying whois.apnic.net]
[whois.apnic.net]
% [whois.apnic.net node-1]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

inetnum:      124.217.224.0 - 124.217.255.255
netname:      PIRADIUS-NET
descr:        PIRADIUS NET
country:      MY
admin-c:      PA124-AP
tech-c:       PA124-AP
status:       ALLOCATED PORTABLE
remarks:      -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks:      This object can only be updated by APNIC hostmasters.
remarks:      To update this object, please contact APNIC
remarks:      hostmasters and include your organisation's account
remarks:      name in the subject line.
remarks:      -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
mnt-by:       APNIC-HM
mnt-lower:    MAINT-MY-PIRADIUS
changed:      hm-changed at apnic.net 20071217
source:       APNIC

person:       PIRADIUS NET Administrator
nic-hdl:      PA124-AP
e-mail:       abuse at piradius.net
address:      PIRADIUS NET
address:      Unit 21-3A, Level 21
address:      Plaza DNP 59, Jalan Abdullah Tahir
address:      Taman Century Garden
address:      80300 Johor Bahru, Johor
address:      Malaysia
phone:        +607 334 8605
fax-no:       +607 334 8605
country:      MY
changed:      admin at piradius.net 20071003
mnt-by:       MAINT-MY-PIRADIUS
source:       APNIC


Vincent Loschiavo
Director of Consulting
[cid:image001.gif at 01C9718E.C7362940]
8200 NW 41st Street, Suite 130
Miami, FL  33166
Ofc: 954-671-5669
Cell: 786-282-1164
Fax: 888-767-5905
Email: vloschiavo at data-corporation.com<mailto:vloschiavo at data-corporation.com>

"KEEPING YOUR BUSINESS HIGHLY AVAILABLE"
[cid:image002.gif at 01C9718E.C7362940]

From: cisco-voip-bounces at puck.nether.net [mailto:cisco-voip-bounces at puck.nether.net] On Behalf Of Corbett Enders
Sent: Thursday, January 08, 2009 12:37 PM
To: Ryan West; Ahmed Elnagar
Cc: VOIP Group
Subject: Re: [cisco-voip] Fraud calls to Cuba - Please read

So it turns out SIP 5060 is open, after running show ip sockets.

Interestingly enough, the hacker is connected to me right now (though we've blocked international calls at the telco level).

His IP is 124.217.250.240.

If you read this article, http://www.honeynor.no/, it describes the attack in detail. I found the article by searching the phone number initially dialed,  52555169000.


From: Ryan West [mailto:rwest at zyedge.com]
Sent: Wednesday, January 07, 2009 9:50 PM
To: Ahmed Elnagar; Corbett Enders
Cc: VOIP Group
Subject: RE: [cisco-voip] Fraud calls to Cuba - Please read

If the router is connected to the Internet, both H323 TCP/1720 and SIP UDP/5060 need to blocked.  I don't remember the command offhand, but on some versions of code it is show ip sockets.  Check this out to actually disable default SIP and H323 processing:

https://supportwiki.cisco.com/ViewWiki/index.php/How_to_disable_H.323_and_Session_Initiation_Protocol_(SIP)_services_on_TCP_ports_1720_and_5060_of_a_IOS_gateway_router
-ryan

From: cisco-voip-bounces at puck.nether.net [mailto:cisco-voip-bounces at puck.nether.net] On Behalf Of Ahmed Elnagar
Sent: Wednesday, January 07, 2009 23:13
To: cenders at homesbyavi.com
Cc: VOIP Group
Subject: Re: [cisco-voip] Fraud calls to Cuba - Please read


Wow...exaclty the same problem I had...but with PRI...I have a site in Egypt that the user called us one day and informed that he has a bill from the Teleco for 100,000$ for a period of 3 months and they never produce this amount of calls...all calls were for random numbers and the call never exceeded 1 minute and these random numbers happen to be starting with 00 which is the internationl prefix here in Egypt.

After long nights of troubleshootting...I found that the gateway was configured to register SIP phones from the internet and I found an IP address from Mexico city that is trying this random calls so frequent, the strange thing is that the gateway was accepting these calls and route it to H323 side which relay the call to the PRI.

I did the following to ensure that it will not happen again...removed SIP at all from the gateway...converted the gateway to MGCP so that every call that will pass the gateway will need signalling from Callmanager and will leave a record in the CDR. But the strange thing the problem contiuned...

During troubleshooting we noticed something strange...alot of incoming calls coming to the PRI from a certain local number...and it was 3 AM in the morning we called this number and he told us that he know no one in this site and he has a problem that he got high invoices from the Teleco too...so we come up with this conculsion...seems that the CO. equipments has some problems and it is generating calls on behalf of the user to random numbers...a strange thing I know but till now this company still going to discussions with the teleco to solve this problem.

I suggest to do the followin...try to review CDR files and have a detailed bill from your Teleco and try to compare these calls with the CDR calls maybe this would help you...also try to activate some debugs and show commands "there is some tools that can automate show command every 5 mins or so" to know exactly when these calls happen and what is the source of it.

Good luck with this strange issue.
Thanks,
Ahmed Elnagar
________________________________
From: cenders at homesbyavi.com
To: cisco-voip at puck.nether.net
Date: Wed, 7 Jan 2009 20:26:56 -0700
Subject: [cisco-voip] Fraud calls to Cuba - Please read
Hello List,

I've got a situation with 2 remote sites.  Over the course of several days in late November, somehow the analog POTS line in the site (which we use for SRST backup) proceeded to make approx 4,940 calls to Cuba.  There wasn't really a pattern to the calls.  It started with a couple of repeated calls to the same number and from that point, the dialed number changed (not dialed in any sort of sequential pattern either).  Calls varied in duration from 0 seconds to many minutes long.  Sometimes the next call would happen right away and other times there would be several minutes delay between calls.  This proceeded to occur over the course of about a day and a half until the POTS provider called us and we blocked the line.

The analog line in the show home serves 2 purposes.  It is connected to the SRST FXO port on the Cisco 2801 router and also connects to the analog fax machine.

At this point, the POTS provider feels that somehow the 2801 router has been compromised and is being used to route calls out the FXO port.  We have a cordless phone on an ATA, and at first they felt this was the source but I indicated that any calls from the cordless phone would leave through our PRI in the main office, through the phone line on the FXO port.

Even if someone had managed to guess our admin password for the console of the router, I don't believe that person sitting on the Internet would be able to get a call to connect from their computer, through the Internet, and leave out our FXO port in our site.

I'm wondering if anyone on the list has some thoughts as to how the system could have been compromise or if it just isn't possible.  The POTS line is actually a digital line provided by Shaw (a local cable/telco in Alberta).  I feel that their "digital" phone terminal has been compromised though it isn't connected to the Internet in any way.  One other possibility is old school phone phreaking where someone has actually tapped into the physical line but they would have been sitting outside in the cold for a very long time making these crazy calls.

I look forward to any insight the collective brain power of this list can provide. The bill for these calls is over $6000.

Regards,
Corbett Enders.

Corbett Enders
Network Manager
Homes by Avi - 2007 Canadian Builder of the Year.
Tel: (403) 536-7170
Fax: (403) 536-7171
www.homesbyavi.com<http://www.homesbyavi.com/>


________________________________
check out the rest of the Windows Live(tm). More than mail-Windows Live(tm) goes way beyond your inbox. More than messages<http://www.microsoft.com/windows/windowslive/>

No virus found in this incoming message.
Checked by AVG - http://www.avg.com
Version: 8.0.176 / Virus Database: 270.10.4/1880 - Release Date: 1/7/2009 8:49 AM
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/cisco-voip/attachments/20090108/d54866f9/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.gif
Type: image/gif
Size: 1017 bytes
Desc: image001.gif
URL: <https://puck.nether.net/pipermail/cisco-voip/attachments/20090108/d54866f9/attachment.gif>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.gif
Type: image/gif
Size: 5783 bytes
Desc: image002.gif
URL: <https://puck.nether.net/pipermail/cisco-voip/attachments/20090108/d54866f9/attachment-0001.gif>


More information about the cisco-voip mailing list