VoIP Phones Now Targets of Hackers: Cisco Ranks First in the Crosshairs But is Far from Alone

By Peter Bernstein December 12, 2012

The hit Mel Brooks film of 1981, History of the World Part 1, contains the wonderful quote from Brooks playing King Louis XVI where he says, “ It's good to be the king!” In the movies, this is true most of the time.   However, being the top gun in anything has risks as well as rewards. It means everyone wants to figuratively and unfortunately literally, take a shot at you. Over the years, such has been the case with Cisco since it emerged as the leader in voice over IP (VoIP) enterprise IP telephony solutions.

In fact, go to Google and type in “hacking VoIP phone systems.” It is depressing on several fronts. The first is the number of entries. Second and third are how long this has been a problem, and the fact that no vendor seems immune. However, last but not least is that Cisco has a big target on it as can be seen from the number of items associated with its VoIP phones.

For instance, last year, the HackLabs cracking demonstration of a VoIP hacking workshop at the AusCERT security conference in Australia, featured a Cisco phone being compromised. The demo showed how virtually any VoIP phone remains vulnerable to popular hacking techniques which means that:

  • ·Call data can be downloaded
  • ·VoIP conversations can be redirected, illegally recorded or similarly manipulated

In fact, at the time Bjoern Rupp, GSMK CryptoPhone's CEO, noted that VoIP phone systems could become networked listening devices, wire tapped remotely or silenced. His point was that VoIP phones are purpose-built computers and therefore need to be protected, just like other computers and currently they come up lacking.

Just how much are they lacking, you ask? Very—something a recent demonstration at the Amphion Forum conference by fifth year grad student Ang Cui from the Columbia University Intrusion Detection Systems Lab showed . 

Without going into all the details, what Cui demonstrated using a Cisco phone, was that by removing a small external circuit board from the phone’s Ethernet port—something that could be done easily and quickly by a “visitor” to your office—by using a smartphone every word spoken over that VoIP phone could be captured even though the VoIP phone was “on-hook.” And, the story gets worse.

According to Cui, not only was the secret in being able to patch the phone’s software with arbitrary pieces of code enabling him to turn the Off-Hook Switch into what he called a “funtenna,” he also claimed he could also do this remotely and without the need to insert a circuit board at all. And, it probably does not need to be said, but once one phone is compromised the potential is there for the entire phone network to be so as well.

Cui’s research at Columbia was through the auspices of a DARPA CRASH and IARPA Stonesoup Program. His work caught the attention of several U.S. federal government agencies whom are big Cisco VoIP phone system users, whom he has briefed on the subject of the vulnerabilities he found. Needless to say, it should cause you to be asking your VoIP vendor, and as mentioned above this really is not about Cisco but is about VoIP systems vulnerabilities in general, about what if anything you need to do to protect your enterprise from those who wish to do your organization harm.

This is much more than being concerned about denial of service attacks and malware infecting your network or bringing down your phone system because it is a data device. As the two hacking demos have highlighted, this is about the ability compromise your voice communications in all sorts of nefarious ways. It is difficult to put a value on peace of mind, yet it is easy to see the havoc that can be wrought as witnessed in the ongoing British tabloid hacking scandal that has rocked the Murdoch media empire. 

Now would be a good time to make that call.




Edited by Jamie Epstein
SHARE THIS ARTICLE
Related Articles

SpaceX and Blue Origin Talk Seriously Going to Mars

By: Doug Mohney    9/29/2016

SpaceX CEO and nerd-god Elon Musk put forth his architecture for mankind to colonize Mars and potentially other bodies in our solar system on Tuesday,…

Read More

The Galaxy Note 7 Disaster: Samsung's Strategic Weakness

By: Rob Enderle    9/29/2016

Samsung was really the only company in recent years to truly threaten Apple successfully; granted, they did so largely with Google's help. But Apple h…

Read More

Was the Yahoo Hack State-Sponsored? Unlikely Says Cyber Expert

By: Gerald Baldino    9/28/2016

Last week, Yahoo confirmed at least 500 million user accounts were compromised by a data breach in 2014. The attack was the largest security breach ev…

Read More

Will Disney Make Twitter the Happiest Social Media on Earth?

By: Alicia Young    9/26/2016

To get back on their feet, Twitter is reportedly seeking an acquisition deal that would value them at $30 billion. There are a few contenders already,…

Read More

500M Yahoo! Users Impacted by Hack; What It Says About Password Protection

By: Paula Bernier    9/23/2016

Yahoo! is facing a lot of challenges lately. Add to the heap the breach - which the company confirmed today - that has affected 500 million Yahoo! acc…

Read More