Tuesday, October 27, 19:08
Home security New CDRThief malware steals VoIP metadata from Linux softswitches

New CDRThief malware steals VoIP metadata from Linux softswitches

Researchers have discovered a new threat called CDRThief that targets a VoIP system and attempts to steal call data records (CDRs).

The analysis of the malware revealed that it was created specifically for a specific Linux VoIP platform, namely the Linknat VOS2009 / 3000 softswitches (software switches).

Softswitch is a software that works as a VoIP server that manages traffic (audio / video / text) on a network telecommunications. It is a central element that ensures the connection between internal and external lines.

The purpose of CDRThief is to compromise VOS2009 / 3000 software and steal call metadata from internal MySQL databases. Metadata are, for example, callers' IP addresses, telephone numbers, start time and duration of calls, route and type.

Analyzing the malware, ESET investigators found that it tried to cover up the malicious Functionality using the encrypted Corrected Block TEA (XXTEA) and then run Base64 encoding on suspicious links.

Although access to the MySQL database is password protected and the key is encrypted in the file configuration, CDRThief can read it and decrypt it, showing that anyone who has developed it knows the platform very well.

CDRThief

From the malware functions, the researchers found that CDRThief is interested in boards containing system event logs, information on VoIP gateways and call metadata.

The malware delivers the information to a command and control (C2) server using JSON via HTTP after compressing and encrypting it with an RSA-1024 public key with a password.

The analysis revealed that CDRThief can be started from anywhere on the disk, using any file name.

It is not clear how persistence is achieved, but researchers say that the above command indicates that malware can be introduced into the platform's startup chain, and is rather disguised as a "Linknat softswitch component".

Based on current analysis observations, CDRThief could be used for cyber espionage or VoIP scams.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.

LIVE NEWS

00:01:47

Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...