Rogue modems on user desktop machines represent another back door into
corporate networks, usually unknown to system administrators. In addition, we
have found several instances where some system administrators used modems to
connect to internal corporate systems from their homes. In some cases, employees
put modems on their desktop PCs when they left for the day so they could
continue working or Internet surfing from home. The systems containing these
unknown modems are often poorly configured and are susceptible to attacks.
Hackers use brute force dialing programs called war dialers to scan ranges of
corporate phone numbers to identify modems. Some war dialer programs can also
identify the type of system to which the modem is connected. Hackers can exploit
such a modem connection to gain access to the system and use it as an entry
point into the network. Poorly controlled or unknown modems contribute to a
major security weakness in today's corporate environment.
Organizations should develop strong policies against the use of unauthorized modems. Security administrators should routinely scan their company's phone number blocks looking for unknown modems and identifying the response of known modems. Authentication for authorized modems should be strengthened to two-factor or token-based authentication.
Organizations should develop strong policies against the use of unauthorized modems. Security administrators should routinely scan their company's phone number blocks looking for unknown modems and identifying the response of known modems. Authentication for authorized modems should be strengthened to two-factor or token-based authentication.
Comments
Post a Comment