Knowledge Base:  
VoIP > --> VoIP >
Bugged by Spoof VC Calls?
Last Updated: 21/11/2014

Unsolicited/malicious calling into VC endpoints – AKA “Metasploit H.323 scanner”

The VC Warehouse Helpdesk has received several calls from customers in the last couple of weeks reporting the following symptoms on their VC endpoint:

Frequent unscheduled incoming calls

H.323 protocol

64K bandwidth

Unknown and constantly changing source IP address

Source name often “Cisco”

This is caused by an H.323 scanning tool that is part of a penetration testing product called “Metasploit,” which has basically got in to the wrong hands.

The aim of this malicious activity is to carry out “toll-fraud” by forcing the receiving video endpoint to make a dial out call to the PSTN/ISDN network, frequently to a premium rate phone number, which not only costs the victim potentially a large amount of money in call costs but also lines the pockets of the fraudsters who also own the premium rate service. The secondary aim of this activity from less “dangerous” parties is just simply to annoy.

However, the good news is, other than the annoyance of receiving all these incoming calls there’s no way that the toll-fraud can be carried out on any Polycom video endpoint, even if it has a PSTN/ISDN network connection in addition to its IP connection, because it’s not possible to initiate an outgoing call from a Polycom video endpoint simply by calling it.

How to mitigate against this for Polycom VC endpoints

The following is a list of deployment scenarios and the steps that can be taken to mitigate against this malicious activity as well as a best practice recommendation to stop the malicious calling now and in the future.

VC endpoint directly on internet (with static public IP address)

This is the most vulnerable deployment of a Polycom VC endpoint because it sits directly on the internet so is completely exposed to the malicious activity. This is not a recommended deployment scenario by VC Warehouse.

Turn off auto-answer – endpoint will still ring

Switch on “Do not disturb” when the endpoint is not in use (remember to switch it off when it is to be used) this will stop the endpoint from ringing, i.e. all calls are blocked

It is assumed the malicious activity will cease when the attackers realise they cannot conduct toll-fraud

VC endpoint NAT’ed (port forwarded) behind firewall

If your VC endpoint is behind a traditional firewall and is NAT’ed from a public IP address you are still vulnerable because the VC endpoint is effectively listening on the internet for an incoming call. As soon as the scanner picks up that you are listening, it will either attempt to call you or call you at a later time. If you have multiple VC endpoints NAT’ed to separate specific public IP addresses then each

one is vulnerable because each one is listening on the internet.

Turn off auto-answer – endpoint will still ring

Switch on “Do not disturb” when the endpoint is not in use (remember to switch it off when it is to be used) this will stop the endpoint from ringing, i.e. all calls are blocked

Activate a “Whitelist” or a “Blacklist” on your firewall – this will enable you restrict or allow incoming calls to known IP addresses. You will need to engage with your firewall admins on this.

Use ACLs (Access Control Lists) on your firewall to block the malicious incoming calls using various parameters contained in the payload. You will need to engage with your firewall admins on this.

Introduce a VC security policy which only allows outgoing IP calls; incoming calls are blocked by the firewall, so the endpoints are not listening on the internet. This will stop the problem altogether but will obviously reduce functionality in that legitimate third-parties cannot call you, only you can call

them. If you do this then you can disregard the four recommendations above. Your firewall will also need to be “SPI” which will open the incoming port (TCP 1720) when a connection is made outbound on the same port in the same session. Again, you will need to engage with your firewall admins on this.

It is assumed the malicious activity will cease when the attackers realise they cannot conduct toll-fraud

BEST PRACTICE - VC endpoints on private network behind “firewall traversal” device:

The recommended best practice by Polycom/Imago is to deploy a firewall traversal device (“VBP” or “RPAD”) to protect your video endpoints which sit on the private network. The firewall traversal device listens on the internet for incoming calls just like a video endpoint. In general the malicious calls are dropped by the traversal device because the malicious caller does not know the internal E.164 extension of the video endpoint. At the time of writing we have had no reports of any customers with firewall traversal devices experiencing this malicious activity.



Attachments:   21/11/2014: Bugged by Spoof VC Calls.pdf


Was this article helpful?

Comments: