The VoIP PBX Honeypot Advance Persistent Threat Analysis
The VoIP PBX Honeypot Advance Persistent Threat Analysis
PBX hacking is a multi-billion dollar per year criminal and terrorism funding source. This paper follows on from a previous 10-day Honeypot experiment, to run a VoIP PBX Honeypot for a longer period of 103-day to not only validate any similarities, but to also analyse non-VoIP methods hackers use in an attempt to gain access to a VoIP System. Over the 103-day data collection period, the Honeypot recorded over 100 million SIP messages. Different techniques were used (including SQL injections in Invites) and hackers of the same IP subnet also attempted using web vulnerabilities in different telephony phone systems to gain access. Of specific interest, over the Christmas period of 2018, attack intensity decreased significantly. To validate these findings, the Honeypot experiment was also conducted for a short period over the Christmas period of 2019 which found that unlike Christmas 2018, attacks increased. The sophistication, scale and complexity of the fraud would suggest an Advance Persistent Threat exists with an aim to infiltrate a VoIP system (including a PBX) to conduct Toll Fraud and where possible to also add that system to a botnet of infected voice systems.
70-80
McInnes, Nathaniel
6745a1ed-9dd9-4c90-a5f8-8c9caf7ce57c
Wills, Gary
3a594558-6921-4e82-8098-38cd8d4e8aa0
2021
McInnes, Nathaniel
6745a1ed-9dd9-4c90-a5f8-8c9caf7ce57c
Wills, Gary
3a594558-6921-4e82-8098-38cd8d4e8aa0
McInnes, Nathaniel and Wills, Gary
(2021)
The VoIP PBX Honeypot Advance Persistent Threat Analysis.
In Proceedings of the 6th International Conference on Internet of Things, Big Data and Security - IoTBDS.
SciTePress.
.
(doi:10.5220/0010443500700080).
Record type:
Conference or Workshop Item
(Paper)
Abstract
PBX hacking is a multi-billion dollar per year criminal and terrorism funding source. This paper follows on from a previous 10-day Honeypot experiment, to run a VoIP PBX Honeypot for a longer period of 103-day to not only validate any similarities, but to also analyse non-VoIP methods hackers use in an attempt to gain access to a VoIP System. Over the 103-day data collection period, the Honeypot recorded over 100 million SIP messages. Different techniques were used (including SQL injections in Invites) and hackers of the same IP subnet also attempted using web vulnerabilities in different telephony phone systems to gain access. Of specific interest, over the Christmas period of 2018, attack intensity decreased significantly. To validate these findings, the Honeypot experiment was also conducted for a short period over the Christmas period of 2019 which found that unlike Christmas 2018, attacks increased. The sophistication, scale and complexity of the fraud would suggest an Advance Persistent Threat exists with an aim to infiltrate a VoIP system (including a PBX) to conduct Toll Fraud and where possible to also add that system to a botnet of infected voice systems.
This record has no associated files available for download.
More information
Published date: 2021
Venue - Dates:
IoTBDS 2021 – 6th International Conference on Internet of Things, Big Data and Security, Online, 2021-04-23 - 2021-04-25
Identifiers
Local EPrints ID: 449592
URI: http://eprints.soton.ac.uk/id/eprint/449592
PURE UUID: cf276fd3-c1c6-4820-9b95-f247a68a9a6f
Catalogue record
Date deposited: 08 Jun 2021 16:32
Last modified: 17 Mar 2024 02:43
Export record
Altmetrics
Contributors
Author:
Nathaniel McInnes
Author:
Gary Wills
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics