FOOD FOR THOUGHT Vitelity hacking?

Federico

New Member
Joined
Jul 17, 2013
Messages
5
Reaction score
0
Today I received emails on two Vitelity accounts indicating trials to reset my password. Anyone else?
The messages indicated that my security questions were not succesfully answered. The attackers had South African IP addresses. Vitelity reset my password to a new one (shown on the email) and asked me to set a new password. I don't know why Vitelity changes your password upon an unseccseful password reset, it doens't seem like a good practice...
I tried to reach Vitelity's web page but it was unresponsive. Later, I was finally able to log in and change my password.
 

hbonath

Guru
Joined
Jan 24, 2012
Messages
150
Reaction score
40
Yep, I woke up to 3 different Vitelity password resets this morning...
 
Joined
May 22, 2013
Messages
50
Reaction score
5
Same here. Changed my password as soon as I got in to the office and all is back to normal.

Of course, in addition to the mentioned need to regularly change your passwords, here is a great example of why you should never set your account to auto-replenish. I really don't need to explain a $20,000 phone bill to my boss today.
 

wardmundy

Nerd Uno
Joined
Oct 12, 2007
Messages
19,206
Reaction score
5,228
I really don't need to explain a $20,000 phone bill to my boss today.


Heh. More bad news usually follows those discussions...

BPZwpwXCAAA6BOG.jpg:large
 

Trimline2

Guru
Joined
May 23, 2013
Messages
524
Reaction score
96
Which leads me to this question. Is there a new and improved Whitelist installation script?
 

w1ve

Guru
Joined
Nov 15, 2007
Messages
819
Reaction score
218
My most-active PIAF is publicly hosted on RentPBX. I have the UI on port 80; I have international trunks and extensions,. That said, I use very, very strong passwords (very long and complex), and of course do not allow anonymous sip.
I think that if you take the right measures, PIAF is very secure, and the measures you need to take are not that complex. For PSTN trunking, I never auto-replenish and always have a circuit-breaker for maximum burn rate (if possible).

There have been a LOT of attacks lately. It's the nature of an interconnected internet. Network Solutions DNS service was down for most of yesterday -- unreal -- our corporate infrastructure was a mess for a good part of the day (I told them not to rely on a single DNS provider -- even if they have geographic diversity.)
 

privacy_nazi

New Member
Joined
Jul 19, 2013
Messages
1
Reaction score
0
The same thing happened to me. My biggest concern is how the account names were discovered.

Vitelity Portal Attack Notice

This morning, I got a notice from Vitelity that their portal was under attack:

"A large scale scan attack was attempted last night around 1am on our portal logins, therefore you may have received an email with a new password. We apologize if this has inconvenienced you."

The offending IP address was 41.84.119.135 but the security question could not be answered. I changed my password as directed, but am stumped as to how the hackers would even know what the login name would be.

Anyone else get a notice or know what may be going on?

Initially I missed reading that link that lgaetz posted and Vitelity never sent any information about a large scale attack to me. Neither did a friend of mine who got the same password reset email others verified. We both wondered the same thing, and assumed that there must have been a leak of the login data. Which coincides with their recent rollout of a new API.

I opened up a support ticket on Friday (the day I read that email) and there has been no reply yet. I also referenced a previous support ticket which brought to their attention a serious flaw in their handling of CDRs. This was when they switched from the more secure but albeit slower method of requiring HTTPS to view/download CDRs to the new method of email/HTTP downloads (email w/HTTP link). The directory used for such HTTP downloads was publically indexable and contained CDRs which were from other customers, some of which had been there for months and one was 365MB in size. Which to their credit they did fix in a timely manner but it certainly made me wonder how it could happen in the first place. It was a social engineering goldmine.

In any case has anyone heard anything further on the matter? I've been a long term customer at Vitelity but have grave concerns about how secure my data and payment methods are in light of this incident.
 

Members online

No members online now.

Forum statistics

Threads
25,825
Messages
167,849
Members
19,250
Latest member
mark-curtis
Get 3CX - Absolutely Free!

Link up your team and customers Phone System Live Chat Video Conferencing

Hosted or Self-managed. Up to 10 users free forever. No credit card. Try risk free.

3CX
A 3CX Account with that email already exists. You will be redirected to the Customer Portal to sign in or reset your password if you've forgotten it.
Top