
Nov. 17, 2012
10:35 p.m.
On Sun, 18 Nov 2012, Robert Dawson wrote:
User mailbox was compromised. The attacker called into the extension and left a voicemail while spoofing the number they wanted to call, ?then called back, logged into the mailbox, retrieved the message, and used the "Callback Caller" option from the playback menu to originate a call back to the spoofed number.
Pretty clever really. What software did the attack compromise? An Aserisk release? Custom rolled or a popular ISO release? Broadsoft? Something else? Thanks, matt at g4.net
I disabled the option in the voice portal to mitigate further attacks. Figured it would be worth sharing.