[cisco-voip] Phone Fraud H.323
Ryan Ratliff (rratliff)
rratliff at cisco.com
Mon Sep 12 13:34:52 EDT 2016
Have you checked your UCM CDR records to see where calls to those numbers are coming from?
With an internal IP and only FXO ports the most likely source is a Unity Connection mailbox with a forwarding rule or something similarly shady.
Tracking the calls inside your network is going to be key to finding out how they are getting triggered.
Unless you have a business need to call Jamaica I’d also start by outright blocking calls to area code 876 at that router.
-Ryan
On Sep 12, 2016, at 8:57 AM, David Zhars <dzhars at gmail.com<mailto:dzhars at gmail.com>> wrote:
Hey Ryan,
The telco said these POTS lines (four of them) were being used to dial Jamaica. The router has 4 FXO ports. For some reason, they were leaving the fourth line alone, though the telco felt that wouldn't last long.
The router only has an internal non-routable IP addy.
Only processes H.323 (but does allow telnet and SNMP)
I don't know what PSTN egress means. Sorry!
On Sun, Sep 11, 2016 at 11:49 AM, Ryan Huff <ryanhuff at outlook.com<mailto:ryanhuff at outlook.com>> wrote:
Hi David,
* Did the telco say that the calls were originated from your POTS trunks or were they responding to customer complaints that one of your numbers had been reported to them for fraud ... etc?
* Does this router have a public Internet facing interface?
* Does this router process any other signaling protocols besides H.323?
* You mentioned having Unity / Unity Connections ... are you allowing PSTN egress from Unity Connections / have you verified the restriction tables are correct?
There are a number of things you could do on either side (UCM / Gateway). To cover the gap for the interim, I would at least deal with the specific called numbers that the telco gave you. In UCM, you could create specific route patterns in the egress path that do not route the match. On the gateway, you could use voice translation rules to try and reject the call attempt or translate the number to something the carrier won't route. You could also create specific dial-peers for the called numbers that do not route to anything.
This reminds me of a time I had this issue (and I was a bit less mature); I created dial-peers on the CUBE that matched the 'bad' called numbers and I routed them back into CCM->CTIRp->CUC and had a small sample of Rick Astley's, "Never Gonna Give You Up" playing as the opening greeting to a System Call Handler .... ahhh the younger days ....
ANYWAYS ....
I would say, in my experience, this sort of thing typically comes from the outside in. In cases where CUBE has a public Internet facing interface, usually someone finds something open on CUBE, sends some signaling that matches a dial-peer and off it goes. In this case you'd want to look at some outside ACLs or putting a firewall between the public Internet and the CUBE. If your CUBE does not face the Internet or is on a private network like MPLS ... that is much less likely to be the case and you want to start looking elsewhere on the network.
I have seen bot dialers/Probers like 'SIPVicious<http://blog.sipvicious.org/>' (Cisco even has an advisory about it<https://tools.cisco.com/security/center/viewAlert.x?alertId=33141>) be able to access CUBE from the inside while installed on an infected PC. Granted, this tool is for SIP, but similar tools exist for h.323.
Thanks,
Ryan
________________________________
From: cisco-voip <cisco-voip-bounces at puck.nether.net<mailto:cisco-voip-bounces at puck.nether.net>> on behalf of David Zhars <dzhars at gmail.com<mailto:dzhars at gmail.com>>
Sent: Sunday, September 11, 2016 9:37 AM
To: cisco-voip at puck.nether.net<mailto:cisco-voip at puck.nether.net>
Subject: [cisco-voip] Phone Fraud H.323
So yesterday I was alerted by our landline company that some of our phone numbers that come in POTS on an H323 router, we being used for phone fraud. I am wondering how this happens with an H323 router (I am familiar with someone hacking Unity and setting up actions to route to Jamaica once someone leaves a voicemail or similar).
The odd part is that these numbers are almost NEVER used for calling out, unless the user presses a 7 for an outbound line (versus an 8 which puts the call out on ISDN).
I found a link on how to disable OffNet calling in UCM, but should I instead look at securing the H323 router? Or does the call blocking rule need to be done in UCM?
Thanks for any enlightenment you can provide.
PS- Client is in USA, call fraud to Jamaica which does not require a country code, so harder to block.
_______________________________________________
cisco-voip mailing list
cisco-voip at puck.nether.net<mailto:cisco-voip at puck.nether.net>
https://puck.nether.net/mailman/listinfo/cisco-voip
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/cisco-voip/attachments/20160912/d8dc99f0/attachment.html>
More information about the cisco-voip
mailing list