• Over 1000 numbers setup in over 100 countries.
• Attacks originate between 700-800 IP Subnets.
• Highly specialised and niche fraud where signifi-
cant understanding of the sector is required.
• With the value of money being moved, specialised
cross border money laundering skills are required.
In comparison to the Essen Honeynet (Hoffstadt
et al., 2012) and the 10-day Honeypot (McInnes
et al., 2019), this 103-day Honeypot and the addi-
tional Christmas 2019 period demonstrates the wide
variety of methods attackers are using in an attempt
to be able to make outbound phone calls. Further-
more, given the scale of events (SIP and Web based)
that have been logged, it would suggest that attack-
ers have improved the automation of their operations.
Elements may still be manual, however based on the
evidence so far, the money involved and size of the
operation, it would suggest this is mostly if not all au-
tomated now.
Sengar suggested that poor configuration and lack
of complex credentials rather than SIP vulnerabilities
are the reasons why SIP systems are compromised
(Sengar, 2014). This research has partially confirmed
this conjecture through seeing poor SIP credentials as
a mechanism for registering with a PBX, although
this research has also demonstrated that there is a
strong indication that given the methodologies used
by the attackers, some methods used are vulnera-
bilities rather than poor configuration. For example
SQL Injection would be a vulnerability at the SIP and
database level due to non-escaping rather than con-
trolled within the administrators domain. This is fur-
ther demonstrated by web based vulnerabilities being
used by attackers against configuration web panels.
This demonstrates how attackers have become more
thorough in there persistence in attempting to infil-
trate a VoIP System.
The large number of IP Subnets involved demon-
strate the challenges Cloud VoIP and PBX administra-
tors have in attempting to protect against attack, while
also not limiting the flexibility, functionality and ben-
efits of NGNs. Due to the high volume of countries
where attacks appear to originate, blocking countries
may not work. Additionally, attacks appear to origi-
nate from well developed countries, so blocking spe-
cific countries may not be practical. Given it is also
unclear if devices are getting hacked and comman-
deered into a botnet, a different approach is required
around attempting to secure setups. This could in-
clude requiring SIP devices to be on the same net-
work through a Virtual Private Network (VPN) con-
nection, implementing features such as Fail2ban (as
discussed in the methodology), using provider spend
limiting and implementation of other firewall type
controls. Although, realistically each setup is differ-
ent and would need professional consideration around
how to secure each setup while maintaining the func-
tionality and benefits PBXs, VoIP and NGN’s bring.
6 CONCLUSION
The data and findings of this 103-day Honeypot has
demonstrated the increase in threats facing PBX own-
ers. Following on shortly after a 10-day Honeypot
(McInnes et al., 2019), this experiment has on bal-
ance through a longer run experiment shown that at-
tacks are on average 16 times more aggressive than
historic research in this area.
This experiment was configured similar to a pre-
vious 10-day Honeypot (McInnes et al., 2019). This
Honeypot (unlike the 10-day experiment) also mon-
itored web ports for hacking attempts in addition to
VoIP ports. In doing so it witnessed that attackers are
multi-discipline in nature by conducting attacks not
only on VoIP protocols, but also web protocols, where
in some cases these were from the same IP subnets.
This research witnessed attempts to make use of vul-
nerabilities in popular VoIP based software for man-
agement and billing used by businesses and providers
respectively to either gain access to these systems for
gathering SIP credentials or to possibly commandeer
to add to a botnet. This experiment also witnessed un-
like previous research, SQL injection style attacks in
the SIP signalling message suggesting that some SIP
systems are vulnerable to malformed SIP headers.
This research saw 100,898,222 SIP messages (ex-
cluding Christmas 2019) in 103 days from over 732
IP subnets in 45 countries. Furthermore, it observed
1,170,828 call attempts to 1720 different numbers in
119 countries. It was witnessed that many of these
attempts appeared to originate from the Honeypot IP
address in the “From” SIP header which suggests a
poorly implemented authentication vulnerability ex-
ists in certain equipment. Furthermore, given the
scale of events this research logged, including how
Christmas 2018 attacks subsided, while Christmas
2019 continued, it would suggest the attackers opera-
tion is now mostly, if not fully automated.
Given the background literature suggesting that
telecom fraud is “being used to prop up failing
economies” (Europol and Trend Micro, 2019), along
with the expected revenue this type of fraud generates
and the technical complexity, sophistication in multi-
ple disciplines and scale in terms of attack sizes, this
research suggests there is an APT dedicated to PBX
hacking to conduct Toll Fraud.
The VoIP PBX Honeypot Advance Persistent Threat Analysis
79