Hello again, and thanks for all the responses to some previous queries. We continue to learn by doing, breaking, fixing, and breaking again.
So, apparently I have a great server out there if anyone needs to make some free calls to the Dominican Republic. Ok, actually it's fixed now, but I have no idea how the hack itself took place and I'd love to get some insight from the more experienced users. This is a test server and admittedly, we weren't watching it TOO closely. We weren't concerned about toll fraud because our endpoint termination with the SIP carrier didn't have international. However, after talking with the carrier (we can discuss specifics in PM, I'm not trying to smear anyone for a mistake) we found out that the DR was accidentally left in their Domestic Rate Deck. That explains how the calls were allowed, but not how our server was compromised in the first place.
I see the calls in our CDR coming from an extension registered to one of the endpoints we were doing some provisioning tests with, in this case a Polycom VVX400. This is a device in the lab on the local LAN, behind a NAT router, on a 192.X.X.X network. The calls were not physically originated from that phone, so they must have been able to compromise that extension through some other means.
To anyone willing to have a look and help shed some light, what can I provide to allow us to determine exactly what occurred?
So, apparently I have a great server out there if anyone needs to make some free calls to the Dominican Republic. Ok, actually it's fixed now, but I have no idea how the hack itself took place and I'd love to get some insight from the more experienced users. This is a test server and admittedly, we weren't watching it TOO closely. We weren't concerned about toll fraud because our endpoint termination with the SIP carrier didn't have international. However, after talking with the carrier (we can discuss specifics in PM, I'm not trying to smear anyone for a mistake) we found out that the DR was accidentally left in their Domestic Rate Deck. That explains how the calls were allowed, but not how our server was compromised in the first place.
I see the calls in our CDR coming from an extension registered to one of the endpoints we were doing some provisioning tests with, in this case a Polycom VVX400. This is a device in the lab on the local LAN, behind a NAT router, on a 192.X.X.X network. The calls were not physically originated from that phone, so they must have been able to compromise that extension through some other means.
To anyone willing to have a look and help shed some light, what can I provide to allow us to determine exactly what occurred?