Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations bkrike on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Toll Fraud - Norstar exploit vulnerability in LINK transfer. CAUTION!

Status
Not open for further replies.

kfife

Technical User
Aug 4, 2009
36
US
We just had our long distance service frozen by XO FRAUD PREVENTION because someone has found a way to HIJACK the link transfer used by the POTS lines in our INBOUND hunt group. The CCR on these lines conditionally transfer callers offsite using link/hookflash/centrex transfers.

It APPEARS to work something like this:
CCR prepares to transfer call offsite, LSDS card generates a link/hookflash on POTS loop. Telco awaits DTMF tones from Norstar for destination phone number. Norstar attempts to send DTMF tones HOWERVER the calling party (fraudster) generates conflicting audio to prevent the Telco from collecting digits. Calling party (fraudster) then INSERTS dtmf tones inband and calls the party of his or her choice. In our case, to mobile phones in Bulgaria, Nigeria, Somalia.

I have not yet fully verified this exploit method, and I'm in the process of collecting more data. This is not DISA fraud or the calls would have been on our LINE POOL, not our inbound pool. Disa is not even enabled on this system. Is the link-transfer method this a well-known exploit? I didn't think their audio was even patched in yet, howerver it's the only way I can explain the calls originating from this line in particular.

This system (MICS) is running 4.x software and is about one week from being de-installed due to an active migration already in progress. It's ironic that the system is running fine for eight years without change, and then gets hacked just days before tear-out.

Ideas??
 
Any time u enable outbound transfer, u run the risk of toll fraud. Restrict all vmail port from LD access.
 
You are right. It's a mailbox exploit. I passed the calls through an asterisk system and recorded the flow. It's a very interesting recording.

I'm trying to determin how they are allowed to build mailboxes externally unless they've simply guessed our password (YES changed to random from default).

 
Change pswds frequently and add make them complex.
 
I just posted ITAS Tip 315 NA for Toll Fraud in the FAQs at the top of the page under NAM

OLD ROLMEN WORKING ON NORTELS AND AVAYA
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top