Latest update:<div><br></div><div><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:10pt"><b>Oct 2012 DDoS attack status:</b></span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">*Updated 10/7*</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">As of 12AM EST, Sunday October 7th 2012, we have returned our systems to 99.9% availability. Calls should work normally and overall call quality should be back to normal.</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">The second attack, which occurred on October 6th 2012, has been fully suppressed and the first has now been contained. Due to the nature, aggressiveness, and complexity of the original attack, we are still now and will continue to thoroughly investigate this matter. Upon the completion of the updates to our full farm of registrar servers additional resources will be deployed to assist in the aforementioned investigation.</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">New code is being written in real-time to further strengthen our network and these updates are being applied throughout the day as soon as they satisfy our internal tests. As such, as these servers are restarted some users may notice call drops in the middle of a call or when ringing (these types of occurrences should be rare), BUT NOT FOR OUR ENTIRE NETWORK. Please note that these issues WILL NOT BE DUE TO A NEW ATTACK but to our engineers rolling out updates as they are applied.</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">Please keep in mind that this is being done to our registrar servers and not to our databases, web servers, internet or PSTN interconnects; as these systems were entirely unaffected.</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">As we mentioned in previous updates, the intent of this attack was to cause a severe service disruption. With that said, again we want to stress that ALL of your information is encrypted, safe and secure; and NO customer data was stolen NOR destroyed.</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">The new registration domains will remain in our network as new registrar servers which can be used by any user. The differences are as follows:</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)"><a href="http://sip.callcentric.com">sip.callcentric.com</a>: For software/hardware that *ONLY* supports DNS A record</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)"><a href="http://srv.callcentric.com">srv.callcentric.com</a>: For software/hardware that supports DNS SRV records</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">In addition to the real-time security audit being done, a system wide security audit will be performed to further strengthen our registrar servers which were attacked.</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">Our main priorities at Callcentric remain unchanged; security, performance, stability, and delivering the best service experience possible for our end-users.</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">Needless to say this attack has been humbling and we want to ensure you that we will learn and grow from this experience and we will use this as an impetus to further enhance our service, support response, and the overall security of our network.</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">We sincerely apologize for any inconvenience experienced as a result of these attacks and we remain committed to employ all of our available resources to assist in answering any questions/concerns and getting all of our customer's services fully restored to the high level that both they/we expect.</span><br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px">
<br style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px"><span style="font-family:verdana,'Lucida Grande',Geneva,arial,helvetica,sans-serif;font-size:12px;background-color:rgb(255,240,208)">Where necessary, further relevant updates will continue to be posted both within the My Callcentric Portal and on our Twitter Page (<a href="https://twitter.com/Callcentric">https://twitter.com/Callcentric</a>). Additionally, we will provide further information in a full email and notice to our customers early in the upcoming week.</span> <br>
<br><div class="gmail_quote">On Sun, Oct 7, 2012 at 6:00 PM, Mitch <span dir="ltr"><<a href="mailto:mitpatterson@gmail.com" target="_blank">mitpatterson@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Doesn't look like it, the time frames don't line up, and the PowerPhone one says it was brief, call centric has been on going.<div class="HOEnZb"><div class="h5"><br><br><div class="gmail_quote">On Sun, Oct 7, 2012 at 1:19 PM, Frank Bulk <span dir="ltr"><<a href="mailto:frnkblk@iname.com" target="_blank">frnkblk@iname.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang="EN-US" link="blue" vlink="purple"><div><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Is is PhonePower using CallCentric?<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><a href="http://www.newsforshoppers.com/phone-power-experiencing-outage/36710225/" target="_blank">http://www.newsforshoppers.com/phone-power-experiencing-outage/36710225/</a><u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Frank<u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p><p class="MsoNormal"><b><span style="font-size:11.0pt;font-family:"Calibri","sans-serif"">From:</span></b><span style="font-size:11.0pt;font-family:"Calibri","sans-serif""> <a href="mailto:outages-bounces@outages.org" target="_blank">outages-bounces@outages.org</a> [mailto:<a href="mailto:outages-bounces@outages.org" target="_blank">outages-bounces@outages.org</a>] <b>On Behalf Of </b>Mitch<br>
<b>Sent:</b> Saturday, October 06, 2012 8:37 PM<br><b>To:</b> Micah Brandon<br><b>Cc:</b> <a href="mailto:outages@outages.org" target="_blank">outages@outages.org</a><br><b>Subject:</b> Re: [outages] Call Centric Sip outage<u></u><u></u></span></p>
<div><div><p class="MsoNormal"><u></u> <u></u></p><p class="MsoNormal">Latest update(I didn't bother pasting the whole thing):<u></u><u></u></p><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal">
<b><span style="font-size:10.0pt;font-family:"Verdana","sans-serif"">Investigation into current problems:</span></b><span style="font-size:9.0pt;font-family:"Verdana","sans-serif""><br>
<span style="background:#fff0d0">Hello,</span><br><br><span style="background:#fff0d0">*UPDATED 10/06 4:00 PM EST*</span><br><br><span style="background:#fff0d0">The second attack against our new servers has been suppressed.</span><br>
<br><span style="background:#fff0d0"><a href="http://sip.callcentric.com" target="_blank">sip.callcentric.com</a> and <a href="http://srv.callcentric.com" target="_blank">srv.callcentric.com</a> should provide better quality and functionality and they are being continually monitored. We are still committed to answering questions and will continue to provide as timely/detailed support as possible.</span><br>
<br><span style="background:#fff0d0">With this in mind, we recommend subscribing/following our official Twitter page (<a href="http://www.twitter.com/Callcentric" target="_blank">http://www.twitter.com/Callcentric</a>) as we will be posting updates and additional information as available.</span><br>
<br><span style="background:#fff0d0">The original attack is still ongoing and we are returning to this issue in order to attempt to restore normal service across the board. This investigation process involves deep packet inspection and analysis to properly diagnose and prevent any other damage.</span><br>
<br><span style="background:#fff0d0">We sincerely appreciate your patience with us and again apologize for the inconvenience.</span></span><u></u><u></u></p><div><p class="MsoNormal"><u></u> <u></u></p><div><p class="MsoNormal">
On Sat, Oct 6, 2012 at 6:38 PM, Micah Brandon <<a href="mailto:brandon@netsville.com" target="_blank">brandon@netsville.com</a>> wrote:<u></u><u></u></p><blockquote style="border:none;border-left:solid #cccccc 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<p class="MsoNormal">Well, that's just weak. Let's publish information for some of our clients. Yeah, the Internets will never find out... However, they do appear to have a handle on things right now. But the botnet is probably at reduced strength over the weekend. They are going to have a serious case of the Mondays if they don't dial it up and get ahead of this thing.<u></u><u></u></p>
<div><p class="MsoNormal"><br>On 10/06/2012 12:25 PM, Mitch wrote:<br>> Well I guess their work around didn't work(probably didn't help that I was one of the people to publish the new info):<br>><u></u><u></u></p>
</div><p class="MsoNormal">> *Investigation into current problems:*<br>> Hello,<br>><br>> *UPDATE*<br>><br>> Unfortunately, the attacks against us have been modified and we are now experiencing two different types of DDoS attacks. The new servers (<a href="http://sip.callcentric.com" target="_blank">sip.callcentric.com</a> <<a href="http://sip.callcentric.com" target="_blank">http://sip.callcentric.com</a>> and <a href="http://srv.callcentric.com" target="_blank">srv.callcentric.com</a> <<a href="http://srv.callcentric.com" target="_blank">http://srv.callcentric.com</a>>) were meant to assist in reducing the load and allowing service to operate for some clients. Unfortunately due to this new information being publicly released, outside of Callcentric, our new servers have also been affected. As such, the work-around that we developed and the information provided yesterday will no longer work.<br>
><u></u><u></u></p></blockquote></div><p class="MsoNormal"><u></u> <u></u></p></div></div></div></div></div></div></blockquote></div><br>
</div></div></blockquote></div><br></div>