Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/22/2008
06:55 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

New VOIP 'Call-Jacking' Hack Unleashed

Researchers release proof-of-concept for advanced phishing and stealing VOIP calls

Now there's a way for attackers to hijack a user's voice-over-IP service: "call-jacking" could let the bad guys launch sophisticated phishing attacks as well as perpetrate lucrative toll fraud.

Researchers from the hacker group GNUCitizen have released a proof-of-concept for call-jacking via a BT Home Hub user's router. The attack exploits cross-site request forgery (CSRF) and authentication bypass vulnerabilities in the router that were previously discovered by the researchers. The attack works even if the default password in the router has been changed.

"We believe that this technique, which we coined as 'call jacking,' is completely new. There is nothing like this in the public domain as far as we know," says Adrian Pastor, a senior IT security consultant for an unnamed penetrating testing firm in London. "The beauty of the attack is that the victim user thinks he/she is receiving a phone call, but in fact he/she is making the phone call and paying for it. We find this quite innovative and unique, hence the need for coining a new term."

The exploit could be used in a phishing attack, where the victim would get a phone call from his "bank" after clicking a link in a phishing email. Phishers typically don't know their victims' phone numbers, he says, so the phone call would help the attacker appear legitimate and gain the victim's trust.

Another attack scenario involves toll fraud, where the victim's router would be forced to dial a toll number. "Premium numbers are very expensive, and allow the identity who registered them -- in this case, the attackers -- make money every time someone dials them," Pastor says.

And the catch with call-jacking is that the victim thinks he or she is receiving a phone call, Pastor says. The victim's phone rings and shows an "incoming" call on the screen -- but his phone instead is actually dialing out to that number.

Pastor and his fellow researcher on the project, Petko D. Petkov, tested the POC on BT Home Hub 6.2.6.B, but expect other versions to be vulnerable as well. Only BT customers using the BT Broadband Talk service are at risk, they say. BT Home Hub is one of the more popular home routers in the U.K.

"BT has stated that the latest firmware is not vulnerable to this," Pastor says. "The problem is that lots of users are still waiting for [their] Home Hub to upgrade to this newer firmware. Once our Home Hub upgrades, we'll verify whether or not BT's claims are correct."

The victim gets infected either by clicking on a malicious link in an email or visiting an infected Website. Then his browser would send an HTTP request to the BT Home Hub's Web interface, which then launches a VOIP connection. After this, the router starts a VOIP/telephone connection to a phone number specified in the exploit.

Aside from the usual "careful where you surf" advice, Pastor says users can protect themselves by deploying browser extensions such as Noscript for Firefox.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18238
PUBLISHED: 2020-02-26
Moxa ioLogik 2542-HSPA Series Controllers and IOs, and IOxpress Configuration Utility ioLogik 2500 series firmware, Version 3.0 or lower IOxpress configuration utility, Version 2.3.0 or lower. Sensitive information is stored in configuration files without encryption, which may allow an attacker to a...
CVE-2019-17274
PUBLISHED: 2020-02-26
NetApp FAS 8300/8700 and AFF A400 Baseboard Management Controller (BMC) firmware versions 13.x prior to 13.1P1 were shipped with a default account enabled that could allow unauthorized arbitrary command execution via local access.
CVE-2019-17275
PUBLISHED: 2020-02-26
OnCommand Cloud Manager versions prior to 3.8.0 are susceptible to arbitrary code execution by remote attackers.
CVE-2020-3169
PUBLISHED: 2020-02-26
A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with a privilege level of root on an affected device. The vulnerability is due to insufficient validation of arguments passed to a spe...
CVE-2020-3170
PUBLISHED: 2020-02-26
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could expl...