Feeds

Security vendors talk up VoIP threats

Phantom menace?

Intelligent flash storage arrays

Security vendors are talking up the potential for attacks on IP telephony systems, reckoned to be the next major market for security defences.

The number of business IP phones sold will grow from 9.9 million in 2006 to 45.8 million in 2010, according to market watchers InStat. Although VoIP systems are becoming increasingly commonplace many firms are not yet prepared for the new security challenges inherent in the technology, creating a fertile ground for vendors across the security marketplace to talk up threats in the hope of kick-starting a market they can then sell into.

Symantec looks into the crystal ball for the year ahead and speculates that VoIP networks will become a new vector in phishing attacks. Scam emails are beginning to invite prospective marks to hand over confidential account details by phone instead of to a fraudulent web sites while other scams use voice networks to contact punters, Symantec researcher Zulfikar Ramzan reports. While conceding that such attacks are rare, Ramzan warns they represent a growing threat.

"These so called voice phishing or 'vishing' attacks leverage voice-over-IP. As a result, such attacks can be conducted cheaply enough that phishers might see a sufficient return on their investment. At the same time, there have not been many reported cases of such attacks, so it’s not clear if they will take off," he writes.

Symantec also notes incidents, recorded elsewhere, where fraudsters send SMS messages to prospective victims. In these so called "smishing" attacks, consumers are typically warned that they will be charged $x per day if a fictitious order at a particular Web site isn’t canceled. In a panic, the victim then visits the site to "cancel" the order, unwittingly handing over their confidential billing details or visiting a site hosting malware.

New anti-phishing techniques (such as the increased use of two-factor authentication that means knowing a user's login credentials alone isn't enough to compromise accounts) are in development to combat these threats, Ramzan writes.

Other security vendors are fretting over the possibility that VoIP networks might be used to spread malicious code. Rather than using the IM clients' built-in VoIP software packages, such as Skype, hackers might design code that changes the numbers associated with users' banks to phone lines controlled by hackers, Fernando de la Cuadra of Panda Software speculates.

"This would require a large degree of innovation, research and development on the part of the creators of malicious code," de la Cuadra writes but if successful would require a new approach to anti-virus defences that relies less on signature recognition, he notes.

UK-based web security firm ScanSafe reckons VoIP - like data networks before - will become an increased focus of application vulnerability and denial of service attacks. In 2007, companies will begin to open up SIP gateways and make them accessible on the Internet. "While this will result in lower costs for telephony, it will also open companies up to a wide variety of threats that are not necessarily being contemplated because many companies still don't perceive a VoIP phone as a 'computer'. The result is that both VoIP devices and servers will be subject to the same to same type of vulnerabilities as any other computer including denial of service attacks, theft of service, fraud and phishing attacks," it warns. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Same old iPad? NO. The new 'soft SIMs' are BIG NEWS
AppleSIM 'ware to allow quick switch of carriers
Arab States make play for greater government control of the internet
Nerds told to get lost in last-minute power grab bid at UN meeting
Brits: Google, can you scrape 60k pages from web, pleeease
Hey, c'mon Choc Factory, it's our 'right to be forgotten'
Of COURSE Stephen Elop's to blame for Nokia woes, says author
'Google did have some unique propositions for Nokia'
It's even GRIMMER up North after MEGA SKY BROADBAND OUTAGE
By 'eck! Eccles cake production thrown into jeopardy
Mobile coverage on trains really is pants
You thought it was just *insert your provider here*, but now we have numbers
Don't mess with Texas ('cos it's getting Google Fiber and you're not)
A bit late, but company says 1Gbps Austin network almost ready to compete with AT&T
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.