{"id":11503,"date":"2013-06-25T00:00:12","date_gmt":"2013-06-25T07:00:12","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=11503"},"modified":"2018-01-30T12:38:52","modified_gmt":"2018-01-30T19:38:52","slug":"sip-based-api-supporting-fake-caller-idsms-number-supporting-diy-russian-service-spotted-in-the-wild","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/06\/25\/sip-based-api-supporting-fake-caller-idsms-number-supporting-diy-russian-service-spotted-in-the-wild\/","title":{"rendered":"SIP-based API-supporting fake caller ID\/SMS number supporting DIY Russian service spotted in the wild"},"content":{"rendered":"<p>One of the most common myths regarding the emerging <strong><a href=\"http:\/\/blog.webroot.com\/tag\/tdos\/\">TDoS (Telephony Denial of Service)<\/a><\/strong>\u00a0market segment, portrays a <a href=\"http:\/\/en.wikipedia.org\/wiki\/Russian_Business_Network\"><strong>RBN (Russian Business Network)<\/strong><\/a> type of bulletproof infrastructure used to launch these attacks. The infrastructure&#8217;s speculated resilience is supposed to be acting as a foundation for the increase of TDoS services and products. Fact or fiction? Keep reading.<\/p>\n<p>In this post, we&#8217;ll profile a <a href=\"http:\/\/en.wikipedia.org\/wiki\/Session_Initiation_Protocol\"><strong>SIP-based<\/strong><\/a>, API-supporting fake caller ID\/SMS number supporting DIY service, and discuss its relevance in the overall increase in TDoS underground market propositions.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshots of the service in action:<\/strong><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-11542\" alt=\"SIP_CallerID_SMS_API_Russian_Managed_Service_04\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/06\/sip_callerid_sms_api_russian_managed_service_04.png\" width=\"714\" height=\"179\" \/><\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/06\/sip_callerid_sms_api_russian_managed_service.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-11537\" alt=\"SIP_CallerID_SMS_API_Russian_Managed_Service\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/06\/sip_callerid_sms_api_russian_managed_service.png\" width=\"706\" height=\"404\" \/><\/a> <a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/06\/sip_callerid_sms_api_russian_managed_service_02.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-11538\" alt=\"SIP_CallerID_SMS_API_Russian_Managed_Service_02\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/06\/sip_callerid_sms_api_russian_managed_service_02.png\" width=\"706\" height=\"374\" \/><\/a> <a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/06\/sip_callerid_sms_api_russian_managed_service_03.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-11540\" alt=\"SIP_CallerID_SMS_API_Russian_Managed_Service_03\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/06\/sip_callerid_sms_api_russian_managed_service_03.png\" width=\"706\" height=\"374\" \/><\/a><\/p>\n<p>Although the featured screenshots offer a fake caller ID service verification on behalf of the cybercriminals operating the service &#8212; advertised publicly since 2011 &#8212; that&#8217;s just the tip of the iceberg, due to the standardized nature of <a href=\"http:\/\/en.wikipedia.org\/wiki\/Session_Initiation_Protocol\"><strong>SIP<\/strong><\/a>, as well as the availability of an API allowing virtually anyone to build custom TDoS (Telephony Denial of Service) attack tools while using their infrastructure.<\/p>\n<p>What&#8217;s ultimately driving the rise of the\u00a0<strong><a href=\"http:\/\/blog.webroot.com\/tag\/tdos\/\">TDoS (Telephony Denial of Service)<\/a><\/strong>\u00a0underground market segment? Is it the existence of bulletproof infrastructure exclusively utilized for malicious and fraudulent purposes, or the <a href=\"http:\/\/cs.ucsb.edu\/~kapravel\/publications\/dial-esorics10.pdf\"><strong>systematic abuse of legitimate infrastructure<\/strong><\/a> in an attempt by the vendors of these services to blend with it in an attempt to make it harder to detect their activities?<\/p>\n<p>Not surprisingly, based on our research, it&#8217;s currently a combination of both, with <a href=\"http:\/\/cs.ucsb.edu\/~kapravel\/publications\/dial-esorics10.pdf\"><strong>the abuse of legitimate services offered by SIP providers and mobile carriers<\/strong><\/a>, as well as the systematic introduction of bulletproof SIP infrastructure. We believe that due to the industry&#8217;s current &#8216;catch up mode&#8217; in regard to this emerging DoS (Denial of Service) vector, cybercriminals will continue successfully launching these attacks, utilizing both legitimate and purely malicious infrastructure, to achieve their objectives.<\/p>\n<p><em>You can find more about Dancho\u00a0Danchev at his\u00a0<strong><a href=\"http:\/\/linkedin.com\/in\/danchodanchev\">LinkedIn Profile<\/a><\/strong>. You can also\u00a0<strong><a href=\"http:\/\/www.twitter.com\/danchodanchev\">follow him on Twitter<\/a><\/strong>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the most common myths regarding the emerging TDoS (Telephony Denial of Service)\u00a0market segment, portrays a RBN (Russian Business Network) type of bulletproof infrastructure used to launch these attacks. The infrastructure&#8217;s speculated resilience is supposed to be acting as a foundation for the increase of TDoS services and products. Fact or fiction? Keep reading. [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[14957,14941,14931,14923,14945,14935,14927,11869,14955,14943,14933,14925,14947,14937,14949,14951,14939,14921,14953,14929],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/11503"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=11503"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/11503\/revisions"}],"predecessor-version":[{"id":18983,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/11503\/revisions\/18983"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=11503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=11503"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=11503"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=11503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}