Transcript
Secure Cloud Communications & Collaboration TM
copyright 2007 all rights reserved
RedShift Networks
Building Secure Communications and Collaboration Clouds 1
Confidential
Communication • Visibility •
Freeswitch Conference Call, October 31st, 2012 Control • Protection www.redshiftnetworks.com
2
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Today’s Headlines full of VOIP and UC Attacks on Global Level
Explosion of VOIP/Video Attacks in 2011 and ALL of 2012 (50% increase of VOIP attacks month to month) Rupert Murdoch’s NewsCorp $55M Loss
$15M loss Attacks Attacks Attacks
Attacks
Attacks Attacks
Attacks
Attacks
Attacks
Attacks
Attacks
Attacks Attacks Attacks
Attacks
GLOBAL SIP BOTNET Attacks
Attacks
Attacks
Attacks Attacks
Attacks Attacks
Attacks
Attacks
VOIP Network Down
Toll Fraud - $80B in losses - Eavesdropping and TDOS Attacks 3
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
$120K Loss
Confidential
Communication • Visibility 4 • Control • Protection
copyright 2007 all rights reserved
VOIP, Unified Communications & Collaboration
Enterprise Unified Communications & Collaboration Market
IDC 5
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
• Unified Communications Market to double by 2014.Massive Growth predictedtecheye.net • The third straight quarter of growth in enterprise telephony equipment propelled the PBX and UC market back to annual growth in 2010, totaling $8.3 billion (up from $7.7 billion in 2009) Infonetics
Explosion of Unified Communications in the Cloud Market VOIP Services Market to become a $76B by 2015 (Infonetics – Sept 2011) • UC as a Cloud Service growing at 93.8% CAGR Infonetics • NTT, Comcast and France Télécom retains its leadership as the world's largest residential VoIP service provider followed by • 100M+ Enterprise VOIP Seats today moving to 250M Plus VOIP Seats from now till 2015 (Worldwide) • Downturn Drives UC Cloud Adoption March, 2010 – Information Age
Confidential 6
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Unified Communications as a Service Vendors
Security for
Servers
Applications
Web Access
Web Servers
IPS Devices • Tipping Point • Intruvert
Email Access
Email (Exchange) Servers
Anti-SPAM • Brightmail • Ironport • Cyphertrust • Postini
Database Access
Database Servers
Database Firewalls • Decru • Imperva
Unified Communications & Collaboration Servers
Unified Communication Servers • IP PBX, • Presence • Conferencing • Collaboration
UCTM (Unified Communications Threat Management)
IPS-DPI
Web Servers
Anti-SPAM
Email Servers
DB Firewall
Database Servers
UC Servers
(IP Voice, Video, UC&C)
7
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
New Threats & New Security Product Segments - Unified Communications & Collaboration Security
Security is ‘Normal’ in a LAN Network (Data) • Enterprises allocate 4% to 8% of their project budget to ‘SECURITY’ • We’d like VOIP Carriers and VOIP network implementers to do the same. attacks
DB Servers DB Firewall (Imperva)
Carrier
Firewall
Enterprise LAN
Anti-SPAM (Cisco)
attacks
Confidential 8
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Microsoft Exchange
UC Cloud - Complement SBC in Data Center with Deep UC & Collaboration Security/Analytics Unified Communications & Collaboration (VOIP/Video) Security: - Visibility, Control and Protection of core SoftSwitch / IP PBX. attacks
Carrier UC&C Data Center Collaboration
RedShift UCTM Hawk
Carrier
SBC
IP PBX UM Presence Conferencing
attacks
Confidential 9
Deep UC application layer security & UC analytics
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Layer 3 to 4 Network (SBC) functions
What is VOIP, Unified Communications & Collaboration ? VOIP & Unified communications (UC) is the integration of real-time communication services such as: • • • • • • • •
SoftSwitch IP Telephony Presence Conferencing / Collaboration (audio, video, web) Instant Messaging (chat) Call control Data sharing (whiteboards, file/app/desktop sharing) Speech recognition/ IVR
With non real-time communication services such as: Unified messaging (integrated voicemail, email, SMS) UC is not a single product, but a set of products that provides a consistent unified user interface and user experience across multiple devices and media types Confidential
10 • Control • Protection Communication • Visibility
copyright 2007 all rights reserved
•
Evolution of Unified Communications and Collaborations
-
Yesterday
2012
Confidential
Communication • Visibility • Control • Protection
Anywhere Anytime Any place VOIP Cloud/SAS Public Clouds
2014-15
copyright 2007 all rights reserved
11
Hosted UC Apps Private Clouds
-
IP PBX Conferencing Presence Collaboration IVR/ACD
VOIP/UC Apps in 2 Years and Beyond
-
VOIP/UC Apps
Unified Messaging (UM)
IVR / ACD
Publishing Documents
Communications Enabled Business Process (CEBP)
Desktop Collaboration
Soft Clients
Desktop Sharing
Video Sharing
Presence
Voicemail
Applications Sharing
UC Endpoints
Video Conferencing
Web Collaboration
IM (Voice/Video)
Documents Sharing
Audio Conferencing
Voice XML Apps
Fax over IP
Click-2-Call Apps
IP-PBX
IM (Text)
Mobile UC
Speech Apps
Increasing complexity 12
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Unified Communications And Collaboration Applications Continue To Grow Presence
The Interconnected Enterprise and VOIP Carrier Fast Explosion of VOIP/UC Enabled Devices
Database Server Farm
Presence/UC Server Farm
Email Server Farm
Web Server Farm
Enterprise C Enterprise B
IP PBX Server Farm
Collaboration IPS-DPI
DB Firewall
Anti-SPAM
Enterprise Service Provider
13
Confidential
WiFi
BYOB “Broadband”
UMA/GSM WiFi/WiMax
Dual-Mode Dual-Mode SOHO/Remote Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Increased Complexity Causing Increased Unmanageability
Factors Driving UC Security Market
Smart Mobile Devices to grow to 1.5B units by 2014 (IDC, May 2011) – UC, Collaboration, Web and Security critical role
14
UC client shipments to grow 65% per year through 2015 (Frost &Sullivan, Nov 2009) Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
SIP Trunking growing at 50%+ CAGR (Nemertes Research)
Inter Connected Unmanaged SIP Deployments Exploding RedShift in the Hosted UC and Collaboration Cloud Offering
Rogue Devices
Rogue Applications
Unified Communications & Collaboration Cloud and SAS Services Desktop/ Application Sharing
Presence
Rogue Users
Unsecure
UC Apps IP PBX
Unified Messaging
Conferencing
Botnet Attacks Mobile Malware
IVR/ACD Collaboration (web/video)
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Disgruntled Employee
Confidential
Communication • Visibility 16 • Control • Protection
copyright 2007 all rights reserved
Why Securing Real Time Applications is vastly different
Requirements for Securing Real Time Flows is vastly different • Category I: Real-time Requirements – 5-9s reliability – Low latency for Signaling and Media •
2ms for signaling; 100µs for media
• Category II: Security Requirements – – – –
Low tolerance to false-positives Low tolerance to false-negatives Call re-attempts are not acceptable Process encrypted traffic (SIP/TLS, SRTP)
– Deep packet inspection capabilities from Layer 3 – Layer 7 VOIP and UC traffic – Heterogeneous architecture comprising of both pro-active and reactive solution elements – Need to maintain multiple levels of call state with adaptive behavioral learning of both UC application and VOIP endpoint – Advance correlation of protocol state and security events across the different layers and security modules – UC-aware policy and incident management system 17
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
• Category III: Technology Requirements
Requirements for Securing Real Time Flows is vastly different – Comprehensively address VOIP, UC and CEBP application security threats • SIP/SCCP/H.323 protocol anomaly detection, IPS, Voice DOS and SPIT prevention, eavesdropping, toll fraud, number harvesting, UC Application threats
•
Category IV: Carrier & Enterprise Focus – Deeper interoperability requirements with disparate systems – Complex services spanning multiple protocols – One security solution – not a slapdash combination of several piecemeal solutions – Zero touch deployment
•
– Tightly integrated with IP-PBX and other communication infrastructure elements – easy to deploy and manage – Easy integration with 3’rd party vendor solutions providing UC and SOA services (e.g. Microsoft, SAP, BEA and IBM) – Provide visibility to all VOIP and UC traffic – Provide control to all UC services, Applications and Assets
18
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Category V: UC/VOIP Focus
Next Generation VoIP/UC Applications and Services: Posing New Threat Vectors and Opportunities Limited VOIP/UC Security IP Phone
Mobile UC Applications
Media Controller
VOIP Firewalls
UC/VOIP servers (collaboration, PBX, Presence, UM, Media, IM)
SBC
IP- enabled Soft phones
IP VOICE/MEDIA Business Applications CRM
DATA
Web
HR
Enriched UC/VOIP Services
Data Protected
UC SOA/ Web-Services Rich Voice/Video Collaborative Apps
ERP IDS/IPS Devices
DPI/Application Firewalls
Network Firewalls
DOS/DDOS Protection
SCM
UC as a Service (UCaaS) Intelligent SIP Applications SIP Trunks
NEW THREATS Illegitimate Interception/ Modification Number Harvesting Call Pattern Tracking Media Hijacking / RTP Flood
Collaboration Hijacking Eavesdropping SPIT Message Stealing Toll Fraud Call-ID spoofing Presence publish Media Threats Voice/UC DOS + 1000’s more
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
UNPROTECTED
Communications
Confidential
Communication • Visibility 20 • Control • Protection
copyright 2007 all rights reserved
Publicized VOIP and UC Threats – case study
Real-time applications bringing about new type of threats & pain points IP PBX
VDOS
Unified Messaging / PBX
SPIT
VPhishing
High-Tech company
“Advertisement”
Network
Banks IP PBX
East/West banks
Network
Network Customers Account Number & PIN
“Advertisement” NASA / NTT
Fake IP PBX
Conferencing Attack – Call Park
Eavesdropping
Toll Fraud IP PBX
IP PBX
Major Call Center
Network
FBI IP PBX
“Buy $10,000,000”
$80 billion loss
Dad London
Network
Network
Uncle Delhi
21
Confidential
Mom Tokyo
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
“Sell $10,000,000”
Spyware Code Red $2.6B Loss
Trojans Worms Virus 42% Internet 5% Internet Penetration
1995
Confidential
Penetration
2000
VOIP SPIT
Slammer $2B Loss
Skype
VOIP/UC Attacks
consumers SF Giants
VM Stealing
VDOS/ TDOS
NASA VOIP Utility Data to Voice
VOIP Toll Fraud
UK Parliament
major vendors, announce VOIP/ UC vulnerabilities at blackhat
Florida - $1M loss NY - $26M loss Panama - $100K loss Rumania - $15M loss
17% VOIP Penetration
2012
Communication • Visibility • Control • Protection
2015
NOW!!
UC & C Aware FW
Loveletter $8B Loss
Botnets
Application
Blackhat Announces Vulnerability
Microsoft Announces Vulnerability
Call-ID spoofing
VOIP FW
SPAM
VOIP Phishing
BotNet
copyright 2007 all rights reserved
22
2005 $22B loss - SPAM
Amazon/ Carrier
Infrastructure
Application & Next Gen FW
Layer 5-7
Bank of America St. Barbara Bank East Coast Bank
Packet Filter & Stateful Packet Inspection FW
Layer 1-4
Timing Comparison: Internet Attacks vs. UC Attacks
Global Increase in High Profile Security Threats, Frauds, Cyber war and Industry Espionage -- VOIP/UC makes it easier High Profile Global Hacking Incidents now happening Voicemail Hacking scandal by News Corp Israel Bezeq network came down for 4 hours shutting down their entire network
Service Providers/ISPs Losing Billions of Dollars in Threats and Fraud Activities Communications Fraud Control Association (CFCA) Telecom Fraud report 2010 - Carriers/ISPs losing $72-80 Billion (USD) in Threats and Fraud attacks The Top 3 Fraud categories include: 29% (approx. $22 billion USD) - Subscription/Identify (ID) Theft 20% (approx. $15 billion USD) - Compromised PBX/Voicemail Systems 6% (approx. $4.5 billion USD) – Premium Rate Service Fraud
Global upsurge in SIP Botnets, Toll Fraud and other malicious threats From China, Russia, Iran - Saw 20,000 separate attack incidents in 3 days
Citibank loses data for 300,000 customers around the world. Automated calling/phishing attacks to gather PIN numbers
23
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
FBI issues multiple Press notes on Toll Fraud, TDOS attack crimes Global Cyber Warfare -- State and Criminal actors Financial Institutions/Credit Card agencies losing $B in dollars
VOIP Fuzzing
Malformed Request (Protocol Fuzzing)
Malformed Protocol Messages
PROTOS Suite
Codenomicon Suite
Spirent ThreatEx
Mu Security
Eavesdropping
Call Pattern Tracking
Number Harvesting
Conversation Eavesdropping and Analysis
Voicemail Reconstruction
TFTP Configuration File Sniffing
Conversation Reconstruction
VOIP Interception / Modification
Call Blackholing
Conversation Alteration
Conversation Degrading
Conversation Hijacking
False Caller Identification
DTMF Alteration / Recording
Service Abuse / Integrity
Call Conference Abuse
Call Stealing (Toll Fraud)
Identity Theft
Registration Spoofing / Attacks
Misconfiguration of Endpoints
Premium Rate Service Fraud
Flood based Disruption of Service
Registration Flooding
User Call Flooding
Directory Service Flooding
DoS on Signaling
RTP DoS Attacks
Distributed DOS Attacks
Signaling or Media Manipulation
Fake Call Teardown Messages
Call Hijacking
Registration Removal / Hijacking / Addition
Wiretapping
SPIT
Key Logging / DTMF Logging
OS Vulnerabilities
Cisco Call Manager Vulnerabilities
Avaya Communication Manager
Microsoft LCS/OCS Server
Nortel
Alcatel Lucent
Siemens / NEC
VOIP Scanning and Enumeration Tools
Nessus
SIP-Scan
SIPp
Sivus
iWar
SIP Crack
Data Threats
SQL Injection
Cross-Site Scripting
Malware
Viruses
Web Vulnerabilities
Buffer Overflows
UC Application Threats
UM – Message Waiting Indication Attacks
UM – Manipulation of User Mailbox
UM – Voicemail Retrieval threats
UM – QoS degradation
Conference – Illegal Join / Leave Conference Attacks
Conference – Moderator Functions Attack
UC Application Threats
Conference – Adding Users Illegally
Conference – Rejoin attacks
Presence State Publish
Watcher authorization
IP-PBX—Password Attacks
IP-PBX – Attendant Forwarding
UC Application Threats
IP-PBX Music on Hold Threats
IP-PBX DND Attacks
Collaboration Web Interface Threats
Collaboration – Unauthorized File Upload threats
Collaboration – Weak backend integrations
Collaboration – Multimode Chat Threats
24
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
UC & Collaboration Threats, Vulnerabilities & Attack Tools
Confidential
Communication • Visibility 25 • Control • Protection
copyright 2007 all rights reserved
Real World VOIP Attacks
Summary of VOIP attacks in 2012 in Carrier Networks Every VOIP network is getting attacked NOW •
•
Nationwide VOIP Carrier - USA •
•
Blast of Registration attacks that almost brought Softswitch to its knees and not allowing legitimate calls into the network.
Global Carrier (with VOIP) - USA •
•
Major SIP DDOS VOIP attack that shutdown entire network
Nationwide VOIP Carrier – USA •
•
Major VOIP attack from 1000’s IP addresses – 60 different types of VOIP attacks. Shut down entire VOIP network for 3 hours.
Nationwide VOIP Carrier - USA •
•
Includes any carrier with SIP footprint – Really a problem as VoLTE rolls out
Major problems with Fraud on VOIP network
International Mobile Operator •
Major problems with Fraud, and attacks on their VOIP network – Losing money constantly and customers complaining.
• And Many more…. Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
•
Attacks seen in US based Network (within 7 days): • Attacks by malicious users using “Scanners”; Scanners like SIPVICIOUS, SIPP etc (over 100 different scanners) •
Lots of these attacks; The attackers initially scans the network and then generate more aggressive attacks!! We saw an aggressive rate of scanners from these IP Addresses.
• Register Attack •
We saw a Register Attack from an IP address in Egypt which is not part of Carrier’s list of customers. This is Toll Fraud and this is an international attacker
• Request Rate Monitor Violations •
Again we are seeing Toll Fraud attack attempts from Germany, Saudi Arabia and Germany.
• Register Hijacking Violations •
Another attempt at Toll Fraud from Nigeria.
•
Lots of these attacks occur when a bad protocol message is sent to the Softswitch which could shut down the Softswitch or cause the Softswitch to go into an ERROR state.
• 27 And Others Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
• Malformed Protocol Messages or Fuzzing Attacks
28
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Attack at an ITSP Network
29
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Advanced Persistent Threat (APT) Attacks (VOIP/UC) @ ITSP Network
Chronology of VOIP/UC Attacks – The Phases
1
2
30
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
3
31
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Fraud – From Global Attacks
Global Blacklist of all VOIP attackers from around the world • As RedShift Networks installs boxes all over the world, each node will learn about ‘attacks & threats’ in different parts of the world and will share this ‘intelligence’ with other carriers
32
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
• RedShift develops signatures of each attack type and attacker
Confidential
Communication • Visibility 33 • Control • Protection
copyright 2007 all rights reserved
VOIP/UC Architecture & Threat Categories
Unified Communications & Collaboration Applications Security – Hundreds of attack vector combinations Business Services
Financials Telephone UC Cloud / Commerce Hosted Services
CRM CEBP …
VULNERABLE
UC &C Apps Unified Messaging Modules
Conferencing Presence Collaboration IVR/ Video Voicemail (web/audio/video) ACD Apps servers IP-PBX (SIP)
IP- PBX
LCS/OCS
(SCCP, H.323, IAX)
(SIP)
Transport Signaling
SIP, H323, MGCP, SCCP SDP, XML, WS
RTP, SRTP
Supporting Services
OS and Networking Layers (Windows, Linux, Unix, Symbian) (TCP, UDP, IP) Configuration (Database) 34
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
HTTP, DNS, DHCP, TFTP, LDAP, RADIUS, AD
Device and OS Vulnerabilities Device Configuration Weakness IP/TCP Network Infrastructure Weakness VOIP & UC Protocols Implementation Vulnerabilities VOIP & UC Network Eavesdropping VOIP & UC Network Interception and Modification Fuzzing Attacks Voice & UC Denial of Service (VDOS/UCDOS) Attacks Signaling Manipulation Attacks Media Manipulation Attacks SPAM over Internet Telephony (SPIT) UC Infrastructure Threats (Voice, Media, IM, Web, UC & Collaboration) UC Application Layer Threats Data Voice Threats Voice Phishing Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
VOIP and UC&C Threat Categories (RedShift’s additions)
VOIP Device and OS Vulnerabilities IP phones, endpoints, Call Managers, Gateways and Proxy servers run on an underlying operating system with can be compromised Most of the devices run on traditional operating systems, e.g. Windows, Linux, RTOS etc. that are vulnerable with numerous exploits publicly available. Several buffer overflow exploits publicly available against the Cisco IOS operating system Denial-of-Service (DOS) exploits triggered by fragmented UDP packets for Alcatel and Avaya phone Most vendors have had announced exploits and vulnerabilities
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
RedShift Networks has a library of thousands of vulnerabilities we have discovered across multiple platforms.
VOIP Device Configuration Weaknesses Weak Configurations - Open TCP/UDP ports, open files shares with global read/write permissions or temporary folders with weak permissions etc. As a result, the services running on these devices now become vulnerable to wide variety of attacks resulting in either a loss of service or a compromise of the device SIPNOC, June, 2012 – VOIP Carriers have HUGE problem with this as many attacks are done during periods when Network Managers are configuring their networks. We see attackers continuously scanning networks – ATTACKS HAPPEN IN A MATTER OF SECONDS
The SNMP services offered by the devices may be vulnerable to reconnaissance attacks. Example, valuable information was gathered from an Avaya IP phone by using SNMP queries with the “public” community name Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Cisco SIP-based phone telnet service vulnerability that allows the telnet service to be exploited by an attacker due to weak password permissions set on the VOIP device
IP/TCP (L2-L4) Infrastructure Weaknesses IP/TCP infrastructure weaknesses: TCP and UDP are transport mediums and are vulnerable to attacks that Examples include DOS/DDOS, session hijacking, protocol anomalies, etc. which may cause an undesirable behavior on the VOIP services Several publicly available tools that generate TCP and/or UDP flooding attacks Lots of tools in the wild – just google for the attack tool in this realm
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Malformed TCP packet generators that can result in undesirable crashes
VOIP and UC Protocol Implementation Vulnerabilities VOIP and UC protocols such as SIP, SCCP, H.323, RTP, XMPP, MSRP, TIP, VXML, UXML, IM protocols etc. are relatively new emerging standards Both the protocol specifications and the subsequent vendor implementations need to mature to reduce the overall threat exposure: •
Parsing errors,
•
NULL packets (**)
•
Anomalous packets (**)
•
Protocol state violations,
•
RFC violations (**) and many more
(**) – We are seeing these attacks in customer networks
The PROTOS work is publicly available as such any script kiddies can download and run the tools necessary to crash vulnerable implementations Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Hundreds of vulnerability discoveries in vendor implementations of VOIP products that use H.323 and SIP by University of Finland’s PROTOS group [5]
VOIP and UC Network Eavesdropping These attacks allow the attacker to obtain sensitive business or personal information otherwise deemed confidential The mechanism is the intercepting and reading, inserting, modifying of messages and conversations by unintended recipients Some examples include •
masquerading (**),
•
registration hijacking (**)
(**) – We are seeing these attacks in customer networks
Eavesdropping
•
impersonation
•
Replay attacks.
•
Call Pattern Tracking
•
Traffic Capture (**)
•
Message Stealing/ Modification (**)
•
Message Tampering (**)
Network
“Sell $10,000,000”
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Confidential
IP PBX “Buy $10,000,000”
VOIP Network Interception and Modification These attacks are focused towards compromising the integrity of a VOIP or UC service The attacks are very targeted and hard to detect
The end outcome of the attack can range from a loss of reputation, brand name, leakage of sensitive information (**) – We are seeing these attacks in customer networks
Few examples include: Registration Hijacking (**)
Toll Fraud
Call Rerouting (**)
$40 billion Problem IP PBX
Conversation Alteration Impersonation (**)
Network
Uncle Delhi
Confidential
Communication • Visibility • Control • Protection
Mom Tokyo
copyright 2007 all rights reserved
Toll Fraud (**lots of attacks)
VOIP/UC Protocol Fuzzing Attacks Fuzzing is a popular black-box testing method employed by software vendors to improve robustness and performance of the code Fuzzing, as a term, relates to negative tests that are designed to test what the software should not do
These tests range from input fuzzing, protocol state fuzzing or structural fuzzing often resulting in a crash, denial-of-service or degradation Fuzzing is the START of the attack!! Few examples include: PROTOS SiVus (**) Spirent ThreatEx
(**) – We are seeing these attacks in customer networks
SIPp (**) 100’s of tools out there. REDSHIFT NETWORKS – We’re seeing scanners continuously HIT all the networks.
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
SIPScan (**)
SIP Fuzzing • SIP grammar (ABNF) – The SIP grammar is defined in RFC 3261 (Augmented Backus-Naur Form)
• SIP Fuzzing: Exploits different aspects of the SIP grammar
43
Infinite sentences Syntax Delimiters Field Values Context-Sensitive
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
– – – – –
SIP Fuzzing Categories • Syntax Errors
44
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
– Syntax errors violate the grammar of underlying language. – They are created by removing an element, adding an extra element and providing the elements in wrong order.
SIP Fuzzing Categories • Delimiter Errors
45
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
– Delimiters mark the separation of fields in a sentence. – In SIP the delimiters are white space characters (space, tab, line-feed, etc), or characters (commas, semicolons etc) – Delimiters can be omitted, multiplied or replaced by other unusual characters. Paired delimiters, such as braces, can be left unbalanced.
VOIP, Media and UC Denial of Service (DOS/DDOS) Attacks • Resource Starvation: Due to flooding attacks originating either from a single source or multiple sources hogging significant CPU bandwidth making the victim server totally unusable • Resource Unusable: Uses a carefully crafted mechanism to exploit a specific vulnerability leading to a crash or a service integrity compromise * Other Flooding attacks: SIP/SCCP/H.323/RTP/UC DOS/DDOS Attacks
IP PBX
VDOS
Forge BYE (**)
Stealth DOS
MWI Flood Attacks (**) – We are seeing these attacks in customer networks Confidential
Communication • Visibility • Control • Protection
Network copyright 2007 all rights reserved
Presence State Flooding (**)
DoS Reported 09/12/2002
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
• FreeSWITCH having issues handling overly long Route header value which results in segmentation fault. This can be also considered as a DoS vulnerability because it is possible to remotely crash FreeSWITCH. Affected version: FreeSWITCH Version 1.2.0rc2+git~20120731T213556Z~e97da8e20a (1.2.0-rc2; git at commit e97da8e20a on Tue, 31 Jul 2012 21:35:56 Z) • Later or previous commits might also affected. • The issue have been To test if you have a vulnerable build do the following: - Prepare an INVITE request containing a Route header with the value generated by the following command: perl -e "print 'A,' x 15000" - Send the prepared INVITE request to port 5060
Signaling Threats (SIP etc) The signaling protocols if not properly authenticated, encrypted and without proper authorization controls can result in several threats include:
. Few examples
Identification of VoIP/UC devices Protocol enumeration (SIP register, options, and invite methods) and VoIP war-dialing (**) Vulnerability scanning of VOIP/UC endpoints (**) Number harvesting and Call pattern tracking (**) Authentication cracking and guessing (**)
Signaling manipulation attacks: Registration (removal, addition, and hijacking methods) and Redirection attacks Signaling teardown resulting in denial-of-service (**) (**) – We are seeing these attacks in customer networks Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Caller ID spoofing: techniques, services, and scenarios (**)
Media And Video Threats (RTP) Exploiting weaknesses in Video Infrastructure Exploiting weakness in IP Video protocols and network Inserting malicious code/scripts in the payloads Exploiting vulnerabilities in Video Applications – e.g. Media Players, Browser-based Media streaming etc.
Video DOS/DDOS Attacks
Video Hijack
Video SPAM
Video Teardown
Video Eavesdropping
Video Recording
The attacker sends a Video SPAM message [e.g. Viagra message] to simultaneous end nodes Eavesdropping of Video traffic using video sniffer tools (MITM Attack)
Video Replay (or Redirect) Attack –
An attacker intercepts a live video conference, e.g. presented by the CEO; replays an earlier private conversation of him with investor
Confidential
An attacker can intercept a live RTP video conferencing stream, hijack it with another video clip [e.g. porn] An attacker tears down an existing video session using a carefully crafted packet An attacker illegitimately intercepts and record live video traffic using packet capture tool [e.g. Wireshark] and save this into a .wav/.avi file that can then be replayed at will
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
The attacker sends a flood of RTP/RTCP packets towards a target [endpoints, servers] resulting in a denial-of-service
SPAM over Internet Telephony (SPIT) • There is a general perception that Voice SPAM will suffer the same fate as Email SPAM • NOW that VOIP deployments today are being interconnected via the internet or Cloud or federation, ie in open networks spammers are starting to exploit these interconnections. (**)
Unified Messaging / PBX
SPIT High-Tech company
Network
(**) – We are seeing these attacks in customer networks
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
“Advertisement”
UC Infrastructure Threats (Voice, Media, IM, Web, UC & Collaboration) UC infrastructure comprising of a complex network of servers, protocols, users and endpoints need to enforce strict policy lockdown measures to reduce the attack exposures Few Examples include: Unauthorized Use of Voice Assets (IP PBX, IP Phone etc) Fraudulent/ wasteful employee calling activity Privilege escalation of VOIP or UC services from Users with lower privileges – weak administrative access levels Excessive use of bandwidth heavy services Weak controls on VOIP/UC, IM or Media services such as FAX over IP, VOIM, video chats
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Weak IP-PBX controls and threats – e.g. Blind Transfer, Auto Attendant override, Music on Hold threats, Call forwarding, Do-Not-Disturb attacks
UC Application Layer Threats UC applications such as Presence, Unified Messaging, Collaboration, Conferencing, IVR, ACD, Telepresence etc. also suffer from threats if proper security enforcements are not properly enforced. Few examples include: Presence -- Illegal Presence state manipulation
Presence -- Unauthorized Presence state monitoring, publish invalid presence states Presence -- Protocol content manipulation resulting in invalid states Presence -- Presence masquerading (or spoofing) Continuous Presence state publish Rupert Murdoch News Corp – Unified Messaging – Illegal Voicemail Reconstruction, retrieval, broadcast Unified Messaging -- Email SPAM on Voice mail systems ; Message Waiting Indication (MWI) attacks
FBI/Scotland Yard Attack - Conferencing -- Illegal Join/Leave attacks, Moderator or Floor control attacks Collaboration -- Hijacking, Altering or Routing, Illegal use of conferencing functions
Collaboration – Teardown, Identity Spoofing/Theft attacks Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Unified Messaging – Protocol Attacks/ DOS on Voice mail systems, email systems, fax machines etc
Data Voice Threats The beauty of converged networks is that voice over IP is 'just' another application running on the data network Unfortunately from a security viewpoint, this means that it will also be affected by all the attacks that affect data networks, even if they are not deliberately targeting voice over IP Few examples include: Buffer overflow exploits (**)
SQL Injection attacks (**) Cross-site scripting Command injections
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
(**) – We are seeing these attacks in customer networks
Voice Phishing – FBI has issued WARNING of this attack • A new form of identity theft which tricks ones into revealing personal information when the scammer replaces a website with a telephone number, or is able to redirect the traffic going to genuine Bank’s PBX to a Fake PBX • Once, the naïve user starts punching his personal information, e.g. social security number, driver’s license, credit card numbers or Bank ATM’s number, the digits are retrieved from the payloads using some advanced
tools
.
VPhishing
Banks IP PBX
East/West banks
Network
Fake IP PBX
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Customers Account Number & PIN
Strict Compliance Enforcements catching up .. • FISMA, FEDRAMP – Provide new Cloud security standards for all cloud business owners including VOIP/UC • SOX – Provide adequate proof of control to VOIP/UC • GLBA – Protect the privacy of consumer information gathered by VOIP/UC systems • HIPAA – Ensure confidentiality of electronic health data transmitted by VOIP/UC systems • PCI-DSS – Ensure protection of credit card data transmitted and used by VOIP/UC systems • The Federal Deposit Insurance Corporation (FDIC) VoIP Guidelines -
it as part of their risk assessment associated with GLBA. • CALEA, EU Regulatory Forum, Telecommunications Act and many more.. Confidential Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
- The FDIC recommends that financial services deploying VOIP evaluate
Growing VOIP/UC Applications Vulnerabilities – A cause of concern Some SIP servers may exclude the “qop” parameter from the 401/407 challenge message. This gives rise to the possibility of undetected message tampering resulting in sensitive SIP signaling data (e.g. originator identity) being changed by an attacker
Registrar SIP implementations may not enforce user names in To header and in Authorization header to be identical. This may allow an attacker to reuse sniffed Authorization header for someone other To header SIP proxy server implementations may accept replayed credentials in call setup requests potentially allowing an attacker to reuse credentials previously captured in the messages of choice
An attacker can reuse previously sniffed credentials and change the From user name to create large number of subscriptions to overload Presence server
Each SIP request generates one of several possible SIP responses. Several implementations are vulnerable to information leak where an attacker can deduce SIP extensions/ user names based on the response codes received to specially crafted requests Unspecified vulnerability in the Nortel CS 1000 M media card in Enterprise VoIP-Core-CS 1000E, 1000M, and 1000S 04.50W before 20070523 in Meridian/CS 1000 allows remote attackers to cause a denial of service (card hang) via unspecified vectors Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
If feature access codes are not properly authenticated or if the authentication is vulnerable to replay attack, then an attacker can use feature access code to make the SIP call server to use spoofed caller ID and place calls on his/her behalf.
Confidential
Communication • Visibility 57 • Control • Protection
copyright 2007 all rights reserved
Recommendations for locking down VOIP networks
Internal controls for VOIP/UC systems ensure strong password strength protection Employ strong encryption (WPA with AES-256 bit) VOIP/UC systems be tested against standard penetration & vulnerability testing tools – patched regularly Provide detailed Call Logs, Billing logs, Alerts & Events log, Audit & Admin Logs Employ strong 2-factor authentication to prevent unauthorized use Ensure security and confidentiality of consumer information gathered by VOIP/UC systems Protect against any MITM based threats – illegal tampering, routing or modification of user or call records – e.g. Call-ID spoofing, Toll Fraud, SQL Injection Protect against unauthorized access to Confidential Communication • Visibility VOIP/UC records
•
Provide security of health data stored in Voice Messaging systems Prevent sabotage of UC/VOIP services – Identity stealing, escalation – minimize use of soft phones – botnets that can steal data Present clean separation of UC VLANs with Data VLANs – Proper Authentication, Authorization, Auditing controls Protect eavesdropping of WiFi IP Phone’s by Encryption All payment card information using VOIP/UC needs to be encrypted with 2factor authentication using a Virtual Private Network (VPN) Prevent against any voicemail hacking attacks Protect against any illegal redirecting or tampering of VOIP traffic Prevent illegitimate eavesdropping (or Control • Protection recording) of media traffic
copyright 2007 all rights reserved
Security Recommendations
Confidential
Communication • Visibility 59 • Control • Protection
copyright 2007 all rights reserved
Case Studies – Locking down VOIP Networks
Case Study #1 – Hosted VOIP Carrier protecting Core network and offering Security for Enterprise customers Enterprise B
Collaboration SoftSwitch Unified Messaging Presence
Carrier’s NOC (Monitor)
Carrier
Conferencing
SBC Eth2
Eth0
OFFERINGS: VOIP Security’ to your Hosted VOIP customers and ‘Monitor/Managed’ the Security on premise (sell or lease) and monitor/report security threats/events/alerts/attacks etc. • AND charge for this new service – Monthly fee for Appliance (sell or lease) & Managing security
60
Enterprise A Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
• Carrier can offer ‘Managed
Customer Case Study #2 – Wholesale Carrier Carrier Customer
Carrier’s NOC (Monitor)
Carrier
61
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Carrier Customer
Customer Case Study #3 – Mobile Operator with VOIP Network A) VOIP Security B) Network Visibility
Enterprise B
A
IMS SBC
Cable
B
A
Carrier B
B B
A
Mobile Carrier’s NOC (Monitoring) Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Carrier Customer
Customer Case Study # 4 – Calling Card Vendor Carrier Customer
Vendor’s NOC VENDOR
1
(Monitor RedShift)
VENDOR
Vendor
1
63
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
VENDOR Carrier Customer
RedShift Unified Communications Threat Management (UCTM) Technology – VOIP/Video Security TOLL FRAUD
VOIP/Video DOS DDOS
VOIP/ VIDEO/ UC POLICIES
DEVICE & USER ANALYTICS
VOIP/UC ENCRYPTION TERMINATION (TLS, SRTP)
USER, APP & NETWORK BEHAVIOUR LEARNING RTP/SRTP (MEDIA SECURITY)
SIP TRUNK SECURITY
FUZZING ATTACKS (Protocol Compliance)
APP AWARE UC/VOIP SECURITY
VOIP/UC IPS
SPIT (SPAM OVER IP TELEPHONY)
SQL DB ATTACKS
WAR DIALING
SIP BOTNET ATTACKS
Stateful Packet Inspection DATA FIREWALL
GLOBAL BLACKLIST SERVICE
Tap mode, Monitor mode & Inline mode
64
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Correlation, Behavior Analysis & Analytics
Next generation IP- Voice, Video and UC&C applications will leverage IP infrastructure to empower richer user experience across any device, any time and from any location The stakeholders must understand that while this move presents great promise, it also presents unique security requirements that are different than conventional data applications Due to real time nature of communications combined with complex interconnect involving many entities, the overall network complexity and threat vectors exposure is alarming It is important to consider proper security measures through the entire lifecycle of the deployment – not an after thought The nature of threats, security risks and exposure need to be understood thoroughly Correlation of THREATS and ATTACKS across GLOBAL NODES Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Conclusions
Thank You
Delivers:
Confidential
Communication • Visibility • Control • Protection
copyright 2007 all rights reserved
Secure CLOUD Communications and Collaboration