john at simplynuc.com
Tue Jun 18 07:18:54 CDT 2019
Just to jump in on this, this just started happening to our system a couple
days ago. (To the tune of 3GB of webserver access logs yesterday)
Our server gives them a 403 for /yealink/ (and a 404 for everything else) -
given that they're still trying to bruteforce it, it looks like I'm gonna
be changing it to give them a 404.
Looks like someone's making a big effort to find provisioning files though.
On Mon, Jun 17, 2019, 13:35 John Kiniston <johnkiniston at gmail.com> wrote:
> On Sun, Jun 16, 2019 at 3:37 PM John T. Bittner <john at xaccel.net> wrote:
>> Anyone know how someone can hack an asterisk box and register with every
>> single account on the box.
>> This box only has 3 accounts, with very complex passwords. Have VoIP
>> blacklist setup and fail2ban…
> I've seen this happen when web-based provisioning is used, I have seen
> attempts to download configuration files off of my provisioning server
> increase in frequency over the last two years.
> The 'Hacker' will do a get on /polycom /cisco /yealink /aastra /mitel etc,
> If they get a valid response they will start enumerating mac addresses
> Then they will use any credentials gained in the download attack to place
> calls, registering as needed.
> -- Bandwidth and Colocation Provided by http://www.api-digital.com --
> Check out the new Asterisk community forum at:
> New to Asterisk? Start here:
> asterisk-users mailing list
> To UNSUBSCRIBE or update options visit:
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the asterisk-users