ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    VOIP voicemail hacked aka DISA toll fraud

    IT Discussion
    10
    43
    2.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DustinB3403D
      DustinB3403 @magicmarker
      last edited by

      @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

      @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

      @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

      Ok, the voicemail PINs were weak which caused the toll fraud.

      This, I think, answers everything. If the PINs were weak, and they weren't chosen by the provider, I see no grey area. This particular instance appears to be both legally and ethically completely on the end customer. Ensuring proper security from the end user's (employee's) perspective cannot be that of the provider.

      Unless they were told that they had to do this and had the authority and expectation of firing offenders, there is no way for that to be on them. The party hiring and managing the people choosing the PINs is the responsible party.

      In regards to this statement. The voicemail policy was set by the VOIP provider. The default voicemail password they pushed out to all the handsets was 1234. So it seems I do have some ground to stand on.

      Um. . . what? I can almost guarantee that their policy was we set a default and your users are expected to change it when they first use it.

      scottalanmillerS magicmarkerM 2 Replies Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @DustinB3403
        last edited by

        @DustinB3403 said in VOIP voicemail hacked aka DISA toll fraud:

        @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

        This should be turned on by default for customers to prevent this. Unbelievable.

        And what happens when the business needs to make a legitimate long distance call and can't? Then the customer complains to the provider and other issues ensue.

        Right, this is why most do "on" by default. And why most that are off by default end up turned on anyway.

        I like how easily voip.ms let's me turn it on and off, and by single country. Like we had to run interviews in Panama two weeks ago, so we turned on Panamanian calling. But it is like $.50 a minute! So as soon as the interviews were done, we turned it off again.

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @DustinB3403
          last edited by

          @DustinB3403 said in VOIP voicemail hacked aka DISA toll fraud:

          @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

          @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

          @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

          Ok, the voicemail PINs were weak which caused the toll fraud.

          This, I think, answers everything. If the PINs were weak, and they weren't chosen by the provider, I see no grey area. This particular instance appears to be both legally and ethically completely on the end customer. Ensuring proper security from the end user's (employee's) perspective cannot be that of the provider.

          Unless they were told that they had to do this and had the authority and expectation of firing offenders, there is no way for that to be on them. The party hiring and managing the people choosing the PINs is the responsible party.

          In regards to this statement. The voicemail policy was set by the VOIP provider. The default voicemail password they pushed out to all the handsets was 1234. So it seems I do have some ground to stand on.

          Um. . . what? I can almost guarantee that their policy was we set a default and your users are expected to change it when they first use it.

          That's what I would expect it to read as.

          DustinB3403D 1 Reply Last reply Reply Quote 0
          • magicmarkerM
            magicmarker @DustinB3403
            last edited by

            @DustinB3403 said in VOIP voicemail hacked aka DISA toll fraud:

            @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

            @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

            @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

            Ok, the voicemail PINs were weak which caused the toll fraud.

            This, I think, answers everything. If the PINs were weak, and they weren't chosen by the provider, I see no grey area. This particular instance appears to be both legally and ethically completely on the end customer. Ensuring proper security from the end user's (employee's) perspective cannot be that of the provider.

            Unless they were told that they had to do this and had the authority and expectation of firing offenders, there is no way for that to be on them. The party hiring and managing the people choosing the PINs is the responsible party.

            In regards to this statement. The voicemail policy was set by the VOIP provider. The default voicemail password they pushed out to all the handsets was 1234. So it seems I do have some ground to stand on.

            Um. . . what? I can almost guarantee that their policy was we set a default and your users are expected to change it when they first use it.

            Good point. Yes, the user needed to change the PIN after first login.

            scottalanmillerS 1 Reply Last reply Reply Quote 0
            • DustinB3403D
              DustinB3403 @scottalanmiller
              last edited by

              @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

              @DustinB3403 said in VOIP voicemail hacked aka DISA toll fraud:

              @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

              @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

              @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

              Ok, the voicemail PINs were weak which caused the toll fraud.

              This, I think, answers everything. If the PINs were weak, and they weren't chosen by the provider, I see no grey area. This particular instance appears to be both legally and ethically completely on the end customer. Ensuring proper security from the end user's (employee's) perspective cannot be that of the provider.

              Unless they were told that they had to do this and had the authority and expectation of firing offenders, there is no way for that to be on them. The party hiring and managing the people choosing the PINs is the responsible party.

              In regards to this statement. The voicemail policy was set by the VOIP provider. The default voicemail password they pushed out to all the handsets was 1234. So it seems I do have some ground to stand on.

              Um. . . what? I can almost guarantee that their policy was we set a default and your users are expected to change it when they first use it.

              That's what I would expect it to read as.

              It's the same policy that Verizon and company use for all of their customers, business and otherwise. You get a default which might be the last 4 of the number, and when you first login you're required to change it.

              Even if you put in the same 4 digits, it's on you the user at that point and not the carrier.

              1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @magicmarker
                last edited by

                @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

                @DustinB3403 said in VOIP voicemail hacked aka DISA toll fraud:

                @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

                @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

                @magicmarker said in VOIP voicemail hacked aka DISA toll fraud:

                Ok, the voicemail PINs were weak which caused the toll fraud.

                This, I think, answers everything. If the PINs were weak, and they weren't chosen by the provider, I see no grey area. This particular instance appears to be both legally and ethically completely on the end customer. Ensuring proper security from the end user's (employee's) perspective cannot be that of the provider.

                Unless they were told that they had to do this and had the authority and expectation of firing offenders, there is no way for that to be on them. The party hiring and managing the people choosing the PINs is the responsible party.

                In regards to this statement. The voicemail policy was set by the VOIP provider. The default voicemail password they pushed out to all the handsets was 1234. So it seems I do have some ground to stand on.

                Um. . . what? I can almost guarantee that their policy was we set a default and your users are expected to change it when they first use it.

                Good point. Yes, the user needed to change the PIN after first login.

                That's what'll get you, I'm afraid. It sounds like the phone provider had a good policy, but policing it had to fall to your HR department or whatever. Unless the phone company had the power and authority and responsibility to see, verify, punish, etc. with customers, there's no way for them to be in the line of accountability. And even if they had all those things, they'd have to agree to provide indemnity on top of that, which they would never agree to, because the Cisco boxes aren't all that secure and if they get hacked that's not their fault nor something they can prevent. And even good PINs can be hacked.

                1 Reply Last reply Reply Quote 1
                • scottalanmillerS
                  scottalanmiller
                  last edited by

                  There is another aspect, too. And that is that there is such a thing as reverse toll fraud. Meaning, you make a bunch of somewhat unusual calls, rack up a crazy bill, then try to not pay it by claiming it was toll fraud. The phone provider can't tell that the calls were legit (which is why their alarms aren't very useful, either.) They can sometimes tell that they are abnormal for you on a client by client basis, but that requires some serious software to determine. And unusual isn't the same and "not legit."

                  So one of the reason that they never offer indemnity is because 99% of the time that "hack" can't be traced to anyone, and so they can't tell the difference between a hacked customer and a customer that is just trying to not pay their bill.

                  Compare it to someone breaking into your house, hopping on your computer, and surfing some websites. The website can tell that you don't often go to that website, but it has no way to know that it is or isn't you.

                  1 Reply Last reply Reply Quote 0
                  • DonahueD
                    Donahue
                    last edited by

                    There are only 10k 4 digit pin combo's anyways. It's never been a very secure mechanism, and without some sort of lockout for too many bad guesses, it's trivial to break any pin.

                    DustinB3403D scottalanmillerS 2 Replies Last reply Reply Quote 2
                    • DustinB3403D
                      DustinB3403 @Donahue
                      last edited by

                      @Donahue most phone systems have a lockout function enabled. If this phone system did or didn't I don't know. But I also don't know if a 4 digit pin was the maximum length a pin could be.

                      DonahueD 1 Reply Last reply Reply Quote 0
                      • DonahueD
                        Donahue @DustinB3403
                        last edited by

                        @DustinB3403 said in VOIP voicemail hacked aka DISA toll fraud:

                        @Donahue most phone systems have a lockout function enabled. If this phone system did or didn't I don't know. But I also don't know if a 4 digit pin was the maximum length a pin could be.

                        true

                        1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @Donahue
                          last edited by

                          @Donahue said in VOIP voicemail hacked aka DISA toll fraud:

                          There are only 10k 4 digit pin combo's anyways. It's never been a very secure mechanism, and without some sort of lockout for too many bad guesses, it's trivial to break any pin.

                          Assuming it's a four digit limit. If so, that's on Cisco, at least that part of it.

                          DustinB3403D jmooreJ 2 Replies Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller
                            last edited by

                            Not all phone systems let you rack up long distance via voicemail, either.

                            1 Reply Last reply Reply Quote 0
                            • DustinB3403D
                              DustinB3403 @scottalanmiller
                              last edited by

                              @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

                              @Donahue said in VOIP voicemail hacked aka DISA toll fraud:

                              There are only 10k 4 digit pin combo's anyways. It's never been a very secure mechanism, and without some sort of lockout for too many bad guesses, it's trivial to break any pin.

                              Assuming it's a four digit limit. If so, that's on Cisco, at least that part of it.

                              Which honestly wouldn't be surprising. . .

                              1 Reply Last reply Reply Quote 0
                              • JaredBuschJ
                                JaredBusch
                                last edited by JaredBusch

                                On this subject, Twilio blocks almost everything not NANPA by default.

                                I just checked, this is all you can call

                                North America: US & Canada
                                South America: Brazil
                                Europe: France, Germany, United Kingdom
                                Asia: India, Israel, Japan
                                Oceania: Australia/Cocos/Christmas Island

                                1 Reply Last reply Reply Quote 0
                                • DustinB3403D
                                  DustinB3403
                                  last edited by

                                  The documentation for the Cisco Unity system says there are policies that can be set for the voicemail pin, including minimum length, the duration an account is locked, if an admin has to manually unlock an account etc.

                                  https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/8x/administration/guide/8xcucsagx/8xcucsag160.pdf

                                  magicmarkerM 1 Reply Last reply Reply Quote 0
                                  • DashrenderD
                                    Dashrender @JaredBusch
                                    last edited by

                                    @JaredBusch said in VOIP voicemail hacked aka DISA toll fraud:

                                    This is one of the reasons I never setup automatic funding on SIP trunks.

                                    The account will run out of money before things get super out of control.

                                    I have adopted this same belief. My customer who I managed their phones asked me if we could just setup auto billing - I told them yes, but then they were at the mercy of hackers if they were hacked and how high the bills would be.
                                    In this case, the customer decided that 4 months of normal billing would be tolerable to loose if hacked versus having to refresh the money more often than 3 times a year.

                                    i.e. let's say they spend $50/m normally. They will preload the account with $200 which should last 4 months. Now they only have to add more money three times a year, not monthly.

                                    JaredBuschJ 1 Reply Last reply Reply Quote 0
                                    • JaredBuschJ
                                      JaredBusch @Dashrender
                                      last edited by

                                      @Dashrender said in VOIP voicemail hacked aka DISA toll fraud:

                                      @JaredBusch said in VOIP voicemail hacked aka DISA toll fraud:

                                      This is one of the reasons I never setup automatic funding on SIP trunks.

                                      The account will run out of money before things get super out of control.

                                      I have adopted this same belief. My customer who I managed their phones asked me if we could just setup auto billing - I told them yes, but then they were at the mercy of hackers if they were hacked and how high the bills would be.
                                      In this case, the customer decided that 4 months of normal billing would be tolerable to loose if hacked versus having to refresh the money more often than 3 times a year.

                                      i.e. let's say they spend $50/m normally. They will preload the account with $200 which should last 4 months. Now they only have to add more money three times a year, not monthly.

                                      Correct. that is how I handle it wit clients. they determine how much to pre-load, but I never let them turn on auto-renew without signing a waiver of liability. So far no one has signed it.

                                      1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller
                                        last edited by

                                        Most of our customers control their own accounts, so if they pre-load or not doesn't come through us. But we never recommend just having it auto-load.

                                        JaredBuschJ DashrenderD 2 Replies Last reply Reply Quote 0
                                        • JaredBuschJ
                                          JaredBusch @scottalanmiller
                                          last edited by

                                          @scottalanmiller said in VOIP voicemail hacked aka DISA toll fraud:

                                          Most of our customers control their own accounts, so if they pre-load or not doesn't come through us. But we never recommend just having it auto-load.

                                          Some do, some do not. But when it is all set up the first time they are told that it is not allowed without signing a waiver that charges are not my problem.

                                          Of course one could change it afterwards, but none have yet.

                                          1 Reply Last reply Reply Quote 0
                                          • magicmarkerM
                                            magicmarker @DustinB3403
                                            last edited by

                                            @DustinB3403 said in VOIP voicemail hacked aka DISA toll fraud:

                                            The documentation for the Cisco Unity system says there are policies that can be set for the voicemail pin, including minimum length, the duration an account is locked, if an admin has to manually unlock an account etc.

                                            https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/connection/8x/administration/guide/8xcucsagx/8xcucsag160.pdf

                                            After the fraud, the VOIP provider has implemented stronger policies for PIN's now. I will be talking to them about implementing some sort of stoppage on international calls after they hit a certain limit. We are also going to take a hard look at turning off international calling and/or picking specific countries that we need to contact.

                                            scottalanmillerS 1 Reply Last reply Reply Quote 2
                                            • 1
                                            • 2
                                            • 3
                                            • 2 / 3
                                            • First post
                                              Last post