By Tuan Nguyen
Posting in Technology
Watch what happens when a hacker tries to take over a VoIP server.
Computer servers are constantly fending off attempts by hackers to infiltrate their systems. Now an IT security expert has illustrated just how dramatic cyber attacks can be.
What you're about to see is visual representation of a hacker launching an attack on a voice over IP server. These kinds of takeover efforts are carried out by criminals who seek to seize VoIP accounts to allow someone else to make long-distance calls at the company's expense.
Here's a brief primer so you'll know what's actually going on:
- The purple bubbles to the left of the screen represent user accounts belonging to people who sign up for VOIP phone services like Skype.
- The tiny white and red bubbles are malicious scans from the hacker's computer that are executed as a way of breaking into customer accounts to steal passwords.
- The green bubbles represent imposter data or in cyberspeak "honeypots" that the server sends to intercept the scans and prevent them from compromising user's accounts.
Although they can be exciting to watch in animated form, attacks like this are a major security threat to firms and their customers. Ben Reardon, who created the visualization wrote on his company's website that "with the increase in popularity of VoIP telephony, attacks are becoming more prevalent. The compromise of a VoIP system can cost the victim over $100,000 in real cash. For example, an Australian based company suffered $120,000 in toll fraud as a result of a VOIP compromise."
- Anonymous hacktivists add Stuxnet code to their arsenal
- Honda security breach risks info of 2.2 million customers
- In cybercrime war, military projects can be game changers
Mar 15, 2011