Thursday, March 4, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Privacy

New Linux Malware Steals Call Details from VoIP Softswitch Systems

September 11, 2020
in Internet Privacy
New Linux Malware Steals Call Details from VoIP Softswitch Systems
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Cybersecurity researchers have discovered an entirely new kind of Linux malware dubbed “CDRThief” that targets voice over IP (VoIP) softswitches in an attempt to steal phone call metadata.

“The primary goal of the malware is to exfiltrate various private data from a compromised softswitch, including call detail records (CDR),” ESET researchers said in a Thursday analysis.

You might also like

A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account

Replacing EDR/NGAV with Autonomous XDR Makes a Big Difference for Small Security Teams

Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection

“To steal this metadata, the malware queries internal MySQL databases used by the softswitch. Thus, attackers demonstrate a good understanding of the internal architecture of the targeted platform.”

cybersecurity

Softswitches (short for software switches) are generally VoIP servers that allow for telecommunication networks to provide management of voice, fax, data and video traffic, and call routing.

ESET’s research uncovered that CDRThief targeted a specific Linux VoIP platform, namely the VOS2009 and 3000 softswitches from Chinese company Linknat, and had its malicious functionality encrypted to evade static analysis.

The malware starts off by attempting to locate the Softswitch configuration files from a list of predetermined directories with the goal of accessing the MySQL database credentials, which are then decrypted to query the database.

ESET researchers say the attackers would have had to reverse engineer the platform binaries to analyze the encryption process and retrieve the AES key used to decrypt the database password, suggesting the authors”http://thehackernews.com/”deep knowledge” of the VoIP architecture.

Besides scooping up basic information about compromised Linknat system, CDRThief exfiltrates details of the database (username, encrypted password, IP address) and executes SQL queries directly to the MySQL database in order to capture information pertaining to system events, VoIP gateways, and call metadata.

“Data to be exfiltrated from the e_syslog, e_gatewaymapping, and e_cdr tables is compressed and then encrypted with a hardcoded RSA-1024 public key before exfiltration. Thus, only the malware authors or operators can decrypt the exfiltrated data,” ESET said.

In its current form, the malware appears to be focused only on gathering data from the database, but ESET warns that could easily change should the attackers decide to introduce more advanced document stealing features in an updated version.

That said, the ultimate goal of the malware authors or information about the threat actor behind the operation still remains unclear.

“At the time of writing we do not know how the malware is deployed onto compromised devices,” ESET’s Anton Cherepanov said. “We speculate that attackers might obtain access to the device using a brute-force attack or by exploiting a vulnerability.”

“It seems reasonable to assume that the malware is used for cyberespionage. Another possible goal for attackers using this malware is VoIP fraud. Since the attackers obtain information about activity of VoIP softswitches and their gateways, this information could be used to perform International Revenue Share Fraud (IRSF).”


Credit: The Hacker News By: noreply@blogger.com (Ravie Lakshmanan)

Previous Post

Coping With Havoc Is A Must For AI Autonomous Cars 

Next Post

Porn site users targeted with malicious ads redirecting to exploit kits, malware

Related Posts

A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account
Internet Privacy

A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account

March 4, 2021
Replacing EDR/NGAV with Autonomous XDR Makes a Big Difference for Small Security Teams
Internet Privacy

Replacing EDR/NGAV with Autonomous XDR Makes a Big Difference for Small Security Teams

March 4, 2021
Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection
Internet Privacy

Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection

March 4, 2021
New Chrome 0-day Bug Under Active Attacks – Update Your Browser ASAP!
Internet Privacy

New Chrome 0-day Bug Under Active Attacks – Update Your Browser ASAP!

March 3, 2021
URGENT — 4 Actively Exploited 0-Day Flaws Found in Microsoft Exchange
Internet Privacy

URGENT — 4 Actively Exploited 0-Day Flaws Found in Microsoft Exchange

March 3, 2021
Next Post
Porn site users targeted with malicious ads redirecting to exploit kits, malware

Porn site users targeted with malicious ads redirecting to exploit kits, malware

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Could Privacy-Preserving, Machine-Learning Tools Recover Private Data? [STUDY]
Machine Learning

Could Privacy-Preserving, Machine-Learning Tools Recover Private Data? [STUDY]

March 4, 2021
Twitter and Twitch added to list of those concerned with Australia’s Online Safety Bill
Internet Security

Twitter and Twitch added to list of those concerned with Australia’s Online Safety Bill

March 4, 2021
Machine learning: is there a limit to technological patents in Brazil?
Machine Learning

The use of artificial intelligence in life sciences and the protection of the IP rights

March 4, 2021
CRM Shortcomings Leading to Lost Revenue
Marketing Technology

CRM Shortcomings Leading to Lost Revenue

March 4, 2021
Google patches actively exploited Chrome browser zero-day vulnerability
Internet Security

Google patches actively exploited Chrome browser zero-day vulnerability

March 4, 2021
A Plethora of Machine Learning Articles: Part 2
Data Science

A Plethora of Machine Learning Articles: Part 2

March 4, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Could Privacy-Preserving, Machine-Learning Tools Recover Private Data? [STUDY] March 4, 2021
  • Twitter and Twitch added to list of those concerned with Australia’s Online Safety Bill March 4, 2021
  • The use of artificial intelligence in life sciences and the protection of the IP rights March 4, 2021
  • CRM Shortcomings Leading to Lost Revenue March 4, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates