Hacking VoIP Exposed

Updated: April 30, 2009

Hackers are a busy bunch. If they're not jamming data networks or crippling users' PCs, they're hijacking servers or stealing privileged information.

Hackers are also beginning to target VoIP systems and their users. Since VoIP is essentially an Internet-based data service, it's as vulnerable to hacker attacks as anything else that moves information across the Web. We recently spoke to Mark Collier, co-author of "Hacking VoIP Exposed" (McGraw-Hill, 2006, paperback, $49.99), for his opinion on the state of VoIP security and how businesses can better understand and deal with various types of Internet telephony threats. Collier is chief technology officer of SecureLogix Corp., an enterprise VoIP network-management tools vendor located in San Antonio, where he is responsible for all the company's product and services research and development. Here are his thoughts on hackers and VoIP.


What are the biggest VoIP hacking threats?

Mark Collier: The biggest potential issue is Denial of Service (DoS). VoIP systems are very susceptible to various forms of DoS. DoS can affect the IP PBX, supporting infrastructure services such as TFTP (Trivial File Transfer Protocol) and DHCP (Dynamic Host Configuration Protocol), the network, and IP phones. DoS can seriously degrade the quality of calls. Also, legacy issues are not going away with the adoption of VoIP. In some cases, VoIP can make some legacy security issues worse.

What can hackers do to a business's VoIP system?

Mark Collier: They can disrupt service, preventing users from effectively using the VoIP system. They can eavesdrop on calls and listen to conversations or gather information such as DTMF {the dialing tones that signify phone numbers}. They can access voice mail. They can steal minutes via toll fraud. They can manipulate the content of calls.

Is SPIT a real problem?

Mark Collier: It isn't now. It will probably develop into a real problem, but it will take several years for it to develop.

Is the hacker problem growing?

Mark Collier: As enterprises deploy more VoIP, as they extend VoIP to teleworkers and the public network, and as they increase the use of softphones and unified communications, the security issues will increase. Hackers will become more interested in attacking VoIP systems. We are already seeing an increase in interest in the hacker community, including development of more and more attack tools.

Are most business users aware of these threats?

Mark Collier: Not really. Some are and some are not. Many are focused on the wrong threats.

What are the top things a business can do to protect itself against VoIP hackers?

Mark Collier: The first step is to perform an assessment to determine what vulnerabilities exist. There are often some simple, inexpensive changes that can be made that will greatly increase security. You can't fix what you aren't aware of. Outsourcing an assessment is a good idea.

What can VoIP service providers and vendors do to make the technology safer?

Mark Collier: The major VoIP system vendors are improving their systems. With each major release, you see real security improvement with many of the vendors, including the leaders like Nortel, Cisco and Avaya. The vendors, however should work better with their customers during deployment,to make sure that the security that is available is used.

Featured Research
  • Phone Systems Comparison Guide: VoIP for Small to Midsize Businesses

    It was a painstaking process, but to help B2B companies start 2017 off on the right foot, we recently compiled a comparative list of the top 43 small to midsize business phone vendors. more

  • 16 Mistakes to Avoid When Buying a Phone System

    Purchasing a phone system for your business is a major investment. With the average business changing phone systems only once every seven years, it’s important to make the right decision. more

  • [Infographic] Top 11 VoIP Vendors

    A good VoIP provider will offer additional benefits as well, but many first-time buyers find assessing each option to be difficult. Nevertheless, this is an important step in the buying process because a substandard provider can easily waste both your time and money. more

  • The New 2017 Phone Systems Comparison Guide

    It was a painstaking process, but to help B2B companies start 2017 off on the right foot, we recently compiled a comparative list of the top 34 business phone vendors in the world. In one, easy-to-reference location, we’ve neatly outlined the information you need. more

  • 8 Common Pain Points UC Eliminates

    Many businesses rely on a collection of communication tools that they adopt to address specific needs as they arise. This strategy may seem to work in the beginning, but eventually will lead to a system that is cumbersome to use, difficult to explain to new hires, expensive, and effective in some areas, but full of gaps. more