Page 129 - SAMENA Trends - February-March 2021
P. 129

ARTICLE  SAMENA TRENDS

        In a few cases, telecom  companies will   the system, resulting in the loss or theft   security assessments and penetration
        act  as  intermediaries  in  the chain  from   of data.                     tests.
        supplier  to subscriber, which opens  even   •  Indirect  Client  Attacks:  Telecom  •  Implement real-time anomaly detection
        more vulnerabilities to the security of the   companies  often have a large client   systems to identify  more advanced
        architecture.                          base, due to which they are more at risk   attacks and their prequels.
                                               for attacks targeted to their customers
        CYBERSECURITY THREATS IN  TELE-        from cybercriminals, such  as identity   2) SIP Hacking
        COMMUNICATIONS                         theft, malware, and phishing attempts.  Session  Initiation  Protocol  (SIP),
        With the  additions  of cloud  computing,                                used  in most voice-over-IP (VoIP)
        IoT, AI technology, and a growing number   Communication  networks need to be   communications,  is  another prime target
        of connected  devices,  the  perimeter  of   resilient. Especially, as the scope, variety,   for malicious parties.  Without  proper
        visibility is widening.              and complexity  of current cybersecurity   security measures, hackers can easily tap
                                             threats are increasing exponentially.  into encryptedcalls, distribute SIP malware
        An important key point  when  attempting                                 and otherwise tamper with the VoIP
        to  reduce  overall  risk  is  acknowledging   The growing volume of data transmissions,   services you are provisioning.
        the wide variety of possible threats to your   legacy technology, and signaling protocols,
        telecom cybersecurity, which may include:  the increased role of cloud  technologies   Here’s a list of cybersecurity threats that
        •  DDoS (Distributed Denial of Service)   and legacy  DNS  and DDoS attacks  are   were common:
          Attacks: Cyber  attackers intentionally   among the most common “bullets” telcos   •  SIP trunk hacking
          overwhelm their target with a stream of   need to dodge on a daily basis.   •  SIP toll fraud
          Internet traffic to deplete their victim’s                             •  Eavesdropping
          uptime and availability.           THE MAIN TYPES  OF CYBER  THREATS   •  Caller ID spoofing
        •  Data Breaches: Telecom  providers   AND WAYS TO MITIGATE THEM         •  DDoS attacks on PBX systems
          continue to struggle with these attacks
          as  they are prime  targets due  to their   1) SS7 and Diameter Signalling Threats  Utility  suppliers  in  the US  faced a  series
          valuable data  and the breadth of their   A number of core telecommunication   of VoIP attacks last year. An attacker was
          services.                          services are still powered by old protocols   initially  targeting  1,500  unique  gateways
        •  Internal  Threats & Human  Error:  This   such as SS7 (Signalling System No. 7) or   tied to  some 600  businesses,  but later
          type  of risk is always present  in a   Diameter.                      focused  on a  single company and, using
          company,  typically  stemming from                                     a  command-injection  technique  over
          an employee who intentionally, or by   SS7 protocol, in particular, has become one   HTTP, injected a malicious web shell into
          mistake, compromises the security  of   of the central cyber threats to the banking   the company’s  server outgoing  directory.
                                             industry since hackers can easily intercept   Granted, the hack was discovered in time
           Communication  networks           2FA authentication codes and drain users’   before much damage had been done.
           need to be resilient. Espe-       accounts.                           Best Practices for Protecting SIP Signalling
                                                                                 •  Enforce strong encryption over  your
           cially, as the scope, variety,    Newer protocols  such  as  SIP (Session   Transport  Layer  Security (TLS) and
           and  complexity  of  current      Initiation Protocol) can also be extremely   Real-Time Protocol (RTP) to protect all
                                                                                    data transmissions.
                                             vulnerable to cyber threats without proper
           cybersecurity  threats  are       controls in place. For instance, in 2018 a   •  Implement   anti-spoofing   for   SIP
           increasing exponentially.         group of  attackers  managed to  stage  a   messages. Ensure that you have proper
                                             denial of  service  (DoS) attack  on Cisco   in-built mechanisms  for challenging
                                             equipment through leveraging malformed   messages and authenticating  SIP
           The  growing  volume of           SIP traffic.                           clients.
           data transmissions, legacy        According to  a  report  by  the European   •  Maintain   strong   Session   Border
                                                                                    Controller  (SBC)  controls  that  perform
           technology,  and signaling        Union for Cybersecurity, most  telecoms   deep  packet inspection  of all  SIP
           protocols,  the  increased        have  implemented the basic  security   messages and prevent unauthorized
           role  of  cloud  technologies     measures for SS7 attacks:              SIP traffic.
                                             Cybersecurity Best Practices for SS7 and
           and legacy DNS and DDoS           Diameter Protocols                  3) DNS Attacks
           attacks  are  among  the          •  Exhaustive monitoring that  covers all   DNS (Domain Name Security) attacks
                                                                                 still remain a major sore point for telcos.
                                               interconnect  and  outgoing  traffic,  as
           most  common  “bullets”             well as core network elements.    What’s  worse, is  that  the cost  of such
           telcos need to dodge on a         •  Harden network nodes by implementing   attacks  is  increasing year-over-year.  In
                                               better firewall configuration rules.
                                                                                 2017, one such  attack  usually  costed  a
           daily basis.                      •  Conduct  regular external network   telecom company $622,100 on average.


                                                                                                    129   FEB-MAR 2021
   124   125   126   127   128   129   130   131   132   133   134