SIP Attacks on internet connected port5060 targeting Asterix servers

Published: 2010-04-15. Last Updated: 2010-04-16 00:04:12 UTC
by Mark Hofman (Version: 1)
1 comment(s)

 We have had a few reports on IP addresses in certain parts of the world sending INVITE requests to Asterix servers and attempting to make calls.  Looking at the port 5060 data there does seem to be an uptick in targets. 

  

If you have some packet captures of this or logs. I'd be interested to take a look at them. 

Thanks

Mark

Keywords: SIP VOIP
1 comment(s)

Comments

A typical event a couple of times a month.
It takes Amazon a couple of days to shut it down.

Port 5060 scan across x.x.x/24
and the 600kbps of SIP REGISTER attempts

43.232.101.75.in-addr.arpa. 300 IN PTR
ec2-75-101-232-43.compute-1.amazonaws.com.

GMT+11
Mar 25 08:43:41 75.101.232.43,5060 -> x.x.x.0,5060 PR udp len 20 440 IN
Mar 25 08:43:41 75.101.232.43,5060 -> x.x.x.1,5060 PR udp len 20 436 IN
... skip 306 lines ...
Mar 25 08:43:42 75.101.232.43,5060 -> x.x.x.209,5060 PR udp len 20 441 IN

10:57:59.15649 75.101.232.43 -> x.x.x.x UDP D=5060 S=5069 LEN=347

REGISTER sip:x.x.x.x SIP/2.0..
Via: SIP/2.0/UDP 10.212.214.3:5069;branch=z9hG4bK-3594771221;rport..
Content-Length: 0..
From: "2999" <sip:2999@x.x.x.x>..
Accept: application/sdp..
User-Agent:friendly-scanner..
To: "2999" <sip:2999@x.x.x.x>..
Contact:sip:123@1.1.1.1..
CSeq: 1 REGISTER..
Call-ID: 1039083047..
Max-Forwards: 70....

Diary Archives