Feeds

Security vendors talk up VoIP threats

Phantom menace?

Boost IT visibility and business value

Security vendors are talking up the potential for attacks on IP telephony systems, reckoned to be the next major market for security defences.

The number of business IP phones sold will grow from 9.9 million in 2006 to 45.8 million in 2010, according to market watchers InStat. Although VoIP systems are becoming increasingly commonplace many firms are not yet prepared for the new security challenges inherent in the technology, creating a fertile ground for vendors across the security marketplace to talk up threats in the hope of kick-starting a market they can then sell into.

Symantec looks into the crystal ball for the year ahead and speculates that VoIP networks will become a new vector in phishing attacks. Scam emails are beginning to invite prospective marks to hand over confidential account details by phone instead of to a fraudulent web sites while other scams use voice networks to contact punters, Symantec researcher Zulfikar Ramzan reports. While conceding that such attacks are rare, Ramzan warns they represent a growing threat.

"These so called voice phishing or 'vishing' attacks leverage voice-over-IP. As a result, such attacks can be conducted cheaply enough that phishers might see a sufficient return on their investment. At the same time, there have not been many reported cases of such attacks, so it’s not clear if they will take off," he writes.

Symantec also notes incidents, recorded elsewhere, where fraudsters send SMS messages to prospective victims. In these so called "smishing" attacks, consumers are typically warned that they will be charged $x per day if a fictitious order at a particular Web site isn’t canceled. In a panic, the victim then visits the site to "cancel" the order, unwittingly handing over their confidential billing details or visiting a site hosting malware.

New anti-phishing techniques (such as the increased use of two-factor authentication that means knowing a user's login credentials alone isn't enough to compromise accounts) are in development to combat these threats, Ramzan writes.

Other security vendors are fretting over the possibility that VoIP networks might be used to spread malicious code. Rather than using the IM clients' built-in VoIP software packages, such as Skype, hackers might design code that changes the numbers associated with users' banks to phone lines controlled by hackers, Fernando de la Cuadra of Panda Software speculates.

"This would require a large degree of innovation, research and development on the part of the creators of malicious code," de la Cuadra writes but if successful would require a new approach to anti-virus defences that relies less on signature recognition, he notes.

UK-based web security firm ScanSafe reckons VoIP - like data networks before - will become an increased focus of application vulnerability and denial of service attacks. In 2007, companies will begin to open up SIP gateways and make them accessible on the Internet. "While this will result in lower costs for telephony, it will also open companies up to a wide variety of threats that are not necessarily being contemplated because many companies still don't perceive a VoIP phone as a 'computer'. The result is that both VoIP devices and servers will be subject to the same to same type of vulnerabilities as any other computer including denial of service attacks, theft of service, fraud and phishing attacks," it warns. ®

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.