Our Videos

December 10, 08

NEWS / NEW TECHNIQUE UTILIZING PRIVATE BRANCH EXCHANGE (PBX SYSTEMS TO CONDUCT VISHING ATTACKS


The FBI has received information concerning a new technique used to conduct vishing (1) attacks. The recent attacks were conducted by hackers exploiting a security vulnerability in Asterisk software. Asterisk is free and widely used software developed to integrate PBX (2) systems with Voice over Internet Protocol (VoIP) digital Internet voice calling services; however, early versions of the Asterisk software are known to have a vulnerability. The vulnerability can be exploited by cyber criminals to use the system as an auto dialer, generating thousands of vishing telephone calls to consumers within one hour.

The vulnerability referred to in this alert is a known vulnerability. Digium, the original creator and primary developer of Asterisk, released a Security Advisory, AST-2008-003, in March of 2008, which contains the information necessary for users to configure a system, patch the software, or upgrade the software to protect against this vulnerability.

If a consumer falls victim to this exploit, their personally identifiable information (PII) will be compromised. To prevent further loss of consumersí PII and to reduce the spread of this new technique, it is imperative that businesses using Asterisk upgrade their software to a version that has had the vulnerability fixed.

Further, consumers should not release personal information in response to unsolicited telephone calls. Providing your PII will compromise your identity!

If you have been a victim of Internet crime, please file a complaint at www.ic3.gov.

(1) Vishing utilizes caller ID spoofing via VoIP to contact potential victims in order to gain access to their PII by convincing the victim that the criminal is associated with a legitimate business with a need to know the victimís PII.

(2) PBX Systems are used by companies to allow telephone calls between VoIP enterprise users on local lines while allowing all users to share a limited number of external lines
http://www.fbi.gov/cyberinvest/escams.htm

 




Testimonials

AnnaMaria Realbuto
Thank you for all your assistance and efficiency...
Read More »
Kateryna Melnychenko
Thanks a lot Anton!...
Read More »
Rani Payne
Thank you so much! Iím sure I will be in touch again with something else that will need to be apost...
Read More »
Serge Bauer Law
Thank you again for your help with this case!...
Read More »



FAQ

How to obtain the Form 6166?
Read More »
WHAT FEES ARE CHARGED FOR CONSULAR NOTARIAL AND AUTHENTICATION SERVICES ABROAD?
Read More »
HOW CAN A U.S. CITIZENS BECOME A NOTARY PUBLIC IN A FOREIGN COUNTRY?
Read More »
What do I need to know about purchasing a franchise business?
Read More »






News

May 16, 24
Bureaucratic snafu with birth certificate strands young US couple with newborn baby in Brazil
Read More »
May 13, 24
Apostille Convention to Take Effect in Rwanda in June
Read More »
May 6, 24
Federal Appeals Court Debates Tennesseeís Birth Certificate Policy Amid Transgender Rights Battle
Read More »
April 30, 24
OJ Simpson died from prostate canceródeath certificate
Read More »