Leverage Asterisk Servers for Monetization: An INJ3CTOR3 Operationby@checkpoint

Leverage Asterisk Servers for Monetization: An INJ3CTOR3 Operation

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Check Point Research encountered a series of worldwide attacks relevant to VoIP, specifically to Session initiation Protocol (SIP) servers. The attack exploits CVE-2019-19006, a critical vulnerability in Sangoma PBX, granting the attacker admin access to the system. Gaining access to SIP servers allows hackers to abuse them in several ways. One of the more complex and interesting ways is abusing the servers to make outgoing phone calls, which are also used to generate profits. Inj3ct0r’s attack flow starts with scanning, continues with exploiting the vulnerability, and proceeds to web shell installation.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Leverage Asterisk Servers for Monetization: An INJ3CTOR3 Operation
Check Point Software HackerNoon profile picture

@checkpoint

Check Point Software

Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.


Receive Stories from @checkpoint

react to story with heart
Check Point Software HackerNoon profile picture
by Check Point Software @checkpoint.Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.
Visit us

RELATED STORIES

L O A D I N G
. . . comments & more!