Feeds

VoIP - open season for hackers

7 out of 10 calls vulnerable to attack

The essential guide to IT transformation

Sensitive data sent using VoIP is vulnerable to attack because call centres are failing to secure their networks robustly enough, according to new research.

Customers' private details could be easily hacked into using the wiretapping method with a staggering 7 out of 10 calls open to attack, said security company Scanit, which audited data transfer at various busy call centres and service providers.

It found lax security for networks at call centres which deal with thousands of calls from around the world and was able to pick up data that included tone-dial PIN numbers used to access phone banking services.

Research also revealed that many companies were left vulnerable to attack because of common-held assumptions that security measures had already been put in place by VoIP vendors on the network.

"Administrators at these places lacked adequate skills and understanding of the security aspects of setting a VoIP network up. They relied on the vendor or system integrator to secure it," said Scanit engineer Sheran Gunasekera.

He also said that "many networks were even running VoIP without encryption."

The research also pointed to the availibility of simple to use free software that can be easily downloaded and installed to pick up unprotected conversations and Gunasekera warned that "one program, called WireShark, detects VoIP calls as they traverse a network, while another, Cain & Abel, records them onto a hard drive, like an MP3."

Selling personal details is increasingly becoming a lucrative business with call staff being offered up to £5 to dish out private data, as a result the researchers conclude that companies should sit up and listen to legitimate security concerns regarding VoIP networks or face severe consequences.

Read morehere.

Next gen security for virtualised datacentres

More from The Register

next story
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.