VoIP Distribution

VoIP is about convergence, saving telecom costs. However, these types of systems also create more inroads for attack & lose lot of money because of VOIP frauds & attacks. In this article, I will discuss a number of different ways your communications system can be breached and how it can be protected.

Is your IP Phone system a target for VOIP attacks?
Every year the number of PBX fraud victims increases dramatically. More and more companies are targeted by individuals who are looking to bring down or exploit the communications system. Some do it for fun and others for illicit profit, but the end result is always the same… It results in the telephone bill of average 5,000$ USD to 80,000$ per attack to your carrier!

The most vulnerable targets remain small-medium size businesses that are new to managing their own VOIP. They either don’t have the IT experience and staff to properly secure and maintain the network, or they’re unaware of the risks altogether having recently switched from a landline system. Whatever the reason, many networks are consistently left unprotected. By the time most companies realize that something is wrong with their phone expenses, it’s too late—the network security has been compromised.

Here is the article link which explain about the VOIP attacks: http://www.nytimes.com/2014/10/20/technology/dial-and-redial-phone-hackers-stealing-billions-.html?_r=0

Toll fraud losses are growing at rate faster than global telecom revenues.

Things to be considered

  • The law is clear, you are the only responsible for the security of your phone system and any charges generated from it.
  • You will pay on average 5,000$ USD to 80,000$ per attack to your carrier.
  • Downtime of your whole system is very common.
  • In some cases you will have to find a different carrier.

Let’s first discuss what steps you can take to protect your account from hackers.

What is STM and how it can help you secure your VOIP infrastructure?

You may be familiar with UTM – Unified Threat Management device, but have you come across an STM – SIP Threat Management device, that is used to protect the IP PBX and IP Phones/Telephony infrastructure from threats/attacks?

The STM – SIP Threat Management device, is installed in front of any SIP based PBX system or gateway and offers extra layers of Toll fraud losses are growing at rate faster than global telecom revenues.

Things to be considered

  • The law is clear, you are the only responsible for the security of your phone system and any charges generated from it.
  • You will pay on average 5,000$ USD to 80,000$ per attack to your carrier.
  • Downtime of your whole system is very common.
  • In some cases you will have to find a different carrier.

Let’s first discuss what steps you can take to protect your account from hackers.

What is STM and how it can help you secure your VOIP infrastructure?
You may be familiar with UTM – Unified Threat Management device, but have you come across an STM – SIP Threat Management device, that is used to protect the IP PBX and IP Phones/Telephony infrastructure from threats/attacks?

The STM – SIP Threat Management device, is installed in front of any SIP based PBX system or gateway and offers extra layers of security against numerous types of attacks that are targeted towards IP telephony infrastructure. The features offered by the STM complement those of a traditional firewall or UTM, and it can be installed in conjunction with a UTM.

Typical STM Installation Diagram
Here is a diagram of a typical STM installation in a VOIP network:

IP PBX Firewall (STM) - As a customer, you are responsible for securing your phone system. On average, an attack costs several thousands of US dollars. Our STM is installed in front of any SIP based PBX or gateway offering several layers of security against numerous types of attacks. Block specific IPs or countries, protect your PBX against hackers trying user names and passwords, someone is trying to flood your PBX with a DDos attacks? No problem!

Overview of the most common attacks to PBXs today and how the ALLO STM handles them

  1. SIP Device Fingerprinting: The hacker will try to identify which PBX software is running or which hardware you are using. Once he gets this info, he will look for their weaknesses and attack accordingly. The STM will simply not answer to such requests leaving the hacker in the dark.
  2. User enumeration: The hacker will request the system to divulge the extension numbers. Once he gets this info, he can then start looking for the passwords. The STM will not give out this info.
  3. Password Cracking Attempt: The hacker will try different user names and passwords in order to gain access to an extension or the admin panel of the PBX. The STM can be configured to block an IP if more than 10 trials are done within 10 minutes, for example.
  4. PHREAKERs: These guys take advantage of your negligence and steal from you without really hacking anything… They just check the most common/default user names and passwords used and if they get lucky, it’s a bad day for the victim.
  5. The Hardcore Scammer: Using scripts and special tools, these criminals know exactly what they are doing and have the knowledge to hack and exploit an unprotected phone system. The list of scams they can run is long but it can range from setting up an extension in your system and using it to sell cheap international calls, to more elaborate FAX back or CALL back scams where they use your system to call very expensive / minute phone numbers they control…
  6. DoS/DDoS attacks: These are designed to flood your PBX with an exaggerated numbers of packets. Their goal is to bring down your communication system and render it unusable. The STM will dynamically block for a pre-determined period of time, the IP or IPs from which these attacks originate.
  7. Cross Site Scripting attacks: These are amongst the most complex and hard to achieve. A script is injected in your PBX by the hacker and can program it to do all kind of malicious actions such as having all your extensions ring at once. The STM blocks off the intent and IP address (es) trying to do that.

Manufacturer’s message: The ALLO.com STM uses the real-time deep packet inspection engine, which is in fact a large database of known threats to PBXs. Much like a terrorist watch list, the STM uses this list to check each SIP packet heading towards your system and blocks any malicious packet as well as its originating IP.

Instead of losing thousands of dollars due to the victim of VOIP attacks, invest on 300$ worth of ALLO STM, which is plug & play.

Investing in an STM to protect your communications network is a must.

For more info, visit: http://shop.voipdistri.com/VoIP-PBX-Hardware/VoIP-PBX/Security-Devices/ALLO-SIP-Threat-Manager–aSTM—Up-to-50-Concurrent-calls–SIP-Security-Device–Analyze-SIP-packets–SIP-Protocol-Anomaly-detection.html

Download

  • Datasheet – Download Now
  • User Manual – Download Now
  • Quick Installation Guide – Download Now

User Interface

Access to GUI demo: Click Here

Username: admin
Password: admin

 

Since 2005, Hanlong released some home-used IP Phone, Unicorn 5001, Unicorn 4102… Now based on the rich experience of R&D, our new full range of Enterprise HD IP Phone is released in 2013. It offers high quality and cost-effective products for end-users, including support for TLS and SRTP protocols and VPN capabilities, also some other features, like Gigabit, color screen, BLF keys, HD voice, graphic icons, multi-languages, auto-provision… Moreover, because of our flexible chipset solution, we make the software be easier to use.

Since 2005, Hanlong released some home-used IP Phone, Unicorn 5001, Unicorn 4102… Now based on the rich experience of R&D, our new full range of Enterprise HD IP Phone is released in 2013. It offers high quality and cost-effective products for end-users, including support for TLS and SRTP protocols and VPN capabilities, also some other features, like Gigabit, color screen, BLF keys, HD voice, graphic icons, multi-languages, auto-provision… Moreover, because of our flexible chipset solution, we make the software be easier to use.

Hanlong has successfully passed the Alcatel-Lucent standards of inter-working on March 2014 required by the Alcatel-Lucent Application Partner Program labs with the Alcatel-Lucent communication platforms?Alcatel-Lucent OmniPCX Enterprise R11.0?. 

Hanlong provides full range of affordable IP Phones to meet customers need, such as enterprise, SMB, carrier and so on. Based on our own , all these IP Phones are with perfect the audio quality and the stable performance. 
Alcatel-Lucent is at the forefront of global communications, providing products and innovations in IP and cloud networking, as well as ultra-broadband fixed and wireless access, to service providers, enterprises and institutions throughout the world. Underpinning Alcatel-Lucent in driving transformation across the industry is Bell Labs, an integral part of Alcatel-Lucent and one of the world’s foremost technology research institutes.
We are pleased to have achieved interoperability validation by Alcatel-Lucent with our IP telephones. The completion of our interoperability testing with Alcatel-Lucent OmniPCX Enterprise R11.0? represents another milestone in our continuing customer-centric approach. We look forward to working closely with Alcatel-Lucent in the near future.
Written on June 25th, 2014, VoIP-News Tags: , , ,

Hanlong Technology launched a series of VOIP products based on TI C5000 DSP. Hanlong Technology integrates key VOIP and codecs technology based on powerful, ultra-low power consumption DSP platform, and develops a series of VOIP products with single chipset, including ATA,IP Phone, Gateway, etc.

 TI Design Network

TI Design Network

Regarding Hanlong Technology–The Only Third Party of Texas Instruments

Hanlong Technology has been committed to the field of VoIP products and applications’ research, development, production, sales and services.The series of Unicorn brand products of Hanlong with outstanding PPR is becoming the industry’s first choice for customers.  

Hanlong Technology was established in Nanjing in 2005 and adheres to the technological innovation, perfect product quality, and excellent services, in the industry it has been widely recognized and praised. 

 

Regarding TI C5000 DSP 

The TI C5000 DSP Series Products, including the C54x and C55x Series , are developed for low-power Consumption DSP market by TI, widely used in Telecom, Voice, Medical, Fingerprint Identify, LED Control, Industry, etc.  

 

For a long term, TI has been developing continually at the Assembly Line of C5000 DSP, popularizing the products with low-power and high-integration one by one, and the C5505, C5515 at present included.
Written on October 27th, 2010, VoIP-News Tags: , , , ,
© 2003 - 2018 VoIPDistri.com