[ISN] Compromised Private Branch Exchange (PBX) and Telephone Voice Mail Systems

From: InfoSec News (isnat_private)
Date: Thu Jun 05 2003 - 23:04:56 PDT

  • Next message: InfoSec News: "[ISN] 'High Risk' Virus Spreading Rapidly"

    The following information, recently received from the Federal Bureau
    of Investigation, is forwarded for your information.  It may be
    further disseminated without restriction in any manner you chose.
    
    Homeland Security Information Bulletin 
    Compromised Private Branch Exchange (PBX) and Telephone Voice Mail
    Systems June 3, 2003
    
    This Bulletin is being disseminated for information purposes only. The
    Department of Homeland Security is working with the Federal Bureau of
    Investigation to address multiple reports from private industry
    describing incidents involving compromises of Private Branch Exchange
    (PBX) and telephone voice-mail systems. These compromises allow
    unauthorized users to make long distance domestic and international
    telephone calls through the compromised systems. FBI Field Offices in
    several cities have been working closely with fraud investigators from
    varioustelecommunication carriers who have reported encountering
    intruders making numerous international calls.
    
    A common scenario for these compromises follows this general pattern:  
    An intruder circumvents a PBX system's security and gains access to a
    voice-mail system. The intruder may then configure the compromised
    system to dial out to a domestic or foreign phone number.
    
    PBX compromises are not a new vulnerability, but they highlight the
    need for PBX users to maintain vigilance. These schemes appear to be
    becoming more prevalent. This illegal activity enables unauthorized
    individuals anywhere in the world to communicate via compromised US
    phone systems in a way that is difficult to trace.  Reports have also
    surfaced suggesting that some of these unauthorized calls are being
    used to connect to local access numbers for internet service
    providers, thereby giving the caller free Internet service via a
    modem. An intruder gaining unauthorized access to several mailboxes
    can redirect repeated calls to a specific number, such as 911, and
    cause denial-of-service (DoS) activity.
    
    While law enforcement and industry investigators work to mitigate
    these ongoing schemes and prosecute the responsible parties, DHS in
    coordination with the FBI has chosen to highlight this activity in
    order to raise awareness among users of PBXs to the possible risk
    associated with exploitation of the PBX vulnerability. DHS and the FBI
    recommend that phone system administrators review their internal
    security policies, enable all password protection functions, change
    default passwords and continually audit phone billing records to
    detect unauthorized activity. Users of PBX systems should consider
    protecting themselves by performing the following basic actions:
    
    1. Periodically change the phone system administrator and 
       maintenance passwords. 
    
    2. Lock users out after a limited number of failed attempts at 
       accessing password protected accounts. 
    
    3. Mandate that all users create their own passwords and change them 
       periodically. 
      
    4. Ensure that passwords are as long as permitted by your system. 
      
    5. Properly secure or disable unnecessary features such as call 
       forwarding or call transfer. 
      
    6. Assign someone as phone system/voice mail administrator and keep 
       him/her informed of personnel changes. 
    
    The National Institute of Standards and Technology (NIST) makes
    available on its Web page NIST Special Publication 800-24 entitled
    "PBX Vulnerability Assessment - Finding Holes in Your PBX Before
    Someone Else Does." This provides generic PBX security methodology and
    vulnerability analysis. The report can be found at:
    
    http://www.csrc.nist.gov/publications/nistpubs/800-24/sp800-24pbx.pdf. 
    
    For specific security and vulnerability information, PBX
    administrators should consult with their respective PBX system vendor.
    
    DHS encourages individuals to report information regarding suspicious
    or criminal activity to law enforcement or a Homeland Security watch
    office.  Individuals may report incidents online at
    http://www.nipc.gov/incident/cirr.htm.  Federal agencies/departments
    may report incidents online at https://incidentreport.fedcirc.gov.  
    cContact numbers for the IAIP watch centers are: for private citizens
    and companies, (202)  323-3205, 1-888-585-9078 or nipc.watchat_private;
    for the telecom industry, (703) 607-4950 or ncsat_private; and for
    Federal agencies/departments, (888) 282-0870 or fedcircat_private
    Contact information for the FBI's field offices can be found at
    http://www.fbi.gov/contact/fo/fo.htm.
    
    DHS intends to update this Bulletin should it receive additional
    relevant information, including information provided to it by the user
    community. Based on this notification, no change to the Homeland
    Security Advisory Level is anticipated; the current HSAS level is
    YELLOW.
    
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomoat_private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Fri Jun 06 2003 - 01:06:45 PDT