(post withdrawn by author, will be automatically deleted in 24 hours unless flagged)
Sangoma Hack / Ransomware
(post withdrawn by author, will be automatically deleted in 24 hours unless flagged)
Isnāt it standard procedure to disclose only limited information, because the hackers read it tooā¦? Doesnāt it take much more time to find out, what the damage really is?
^^^ this is exactly my fear. I donāt care a WHIT about the phone system. Iām concerned about a jumping off point. Especially for the clients that do have some cross VLAN routing for mobile apps, Xactview, email etc. Weāve since mitigated that possibility, but it was not necessary previously since the PBX is not open to the public in any form (heck, we even have clients that still do not use SIP as their trunks). Until a full 3rd party forensic audit confirming no injected code that firewall is on high alert.
So what is the consensus at this point: Are we trusting module updates or no?
Iām leaning to ānoā pending full assurance by Sangoma, but am curious where others are.
Will never happen.
Best they can (and should) do is clarify what theyāve done to audit, followed by the same āno evidenceā language theyāve already given. No matter how complete the forensics, there is always a chance they will miss something. I donāt see the attorneys letting them speak in absolutes.
I think some of the expectations here are a little out of line with reality and what any other company has actually done in similar circumstances, but many have been better at managing the news.
But, being a non-distro user, this is pretty much a non-event for us.
Yes.
Iāll elaborate why yes.
This hack seems to be more of a ransomware than a targeted SolarWinds type of attack. From what we know (at the time of writing this), in the information posted by the hackers as well as what Sangoma published in their statements, it seems like the hackers obtained a ton of Accounting/Financial/Employee information.
How much you donāt want to trust Sangoma, I can assure you that they placed the mirror servers under a magnifying glass as soon as they discovered the hack. How much you are afraid of a SolarWind type of hack, they are even more⦠And I trust Sangoma that if they have spotted something fishy they wouldāve taken down the mirror servers, or included that in the statement.
Additionally, some former developers had mentioned:
And
Thoughts?
The SolarWinds issue was in the supply chain. I donāt know dinkus about the Sangoma supply chain, but it does appear to have changed in the last couple years.
And relying on the opinions of people who used to be part of it but arenāt any longer is not, IMO, a good plan. Nothing against James or Rob at all, just that they arenāt the voice from whom Iād like to have more assurance about the integrity of the code.
Looping back on this.
In the absence of direction from Sangoma weāre not installing any module updates for clients. Itās just too much risk to assume.
What amazing is how with so many possible security layers (e.g. - client antivirus, DNS proxy filtering, hardware firewalls, AI-type security appliances, spam/malware e-mail filtering, etc.) most organizations are still vulnerable to a degree mainly due to the PEBCAK. Be it through social engineering type phone calls, spearphishing, or just flat baiting someone.
Iāve seen a good amount of larger tech companies get dinged, our retail manufacturers and suppliers get hit, and weāve all seen the fallout from the SolarWinds s$#tshow. Too bad we canāt grant business Internet access based on the merit/demerit system!