ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Sangoma Ransomware

    IT Discussion
    sangoma ransomware pbx voip hack security
    9
    53
    4.6k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JaredBuschJ
      JaredBusch
      last edited by

      The concern is not the open source. The concern is closed source.

      scottalanmillerS 1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller @Obsolesce
        last edited by

        @Obsolesce said in Sangoma Ransomware:

        I doubt they have AD, which makes a compromised AD joined device your golden ticket into the entire domain as domain admin. And it is also likely this was solely a ransomware attack.

        Oh I bet that they are. Just the nature of being a hardware design and manufacturing firm.

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @JaredBusch
          last edited by

          @JaredBusch said in Sangoma Ransomware:

          The concern is not the open source. The concern is closed source.

          Very true. Definitely any closed source from them is very suspect now as there's two risks...

          1. Attacks now know of security holes that weren't public simply by getting "read access" to the code.
          2. Compromised are injected because there's no community or repo protection against changes.
          ObsolesceO 1 Reply Last reply Reply Quote 0
          • DashrenderD
            Dashrender @scottalanmiller
            last edited by

            @scottalanmiller said in Sangoma Ransomware:

            1. FreePBX code impacted. <- No cause for concern but this is the key "panic" that people are promoting to try to make this into a big deal. I don't know anyone that is a Sangoma customer or why much of anyone would be, the kind of stuff that they make isn't stuff for modern businesses. What they make of importance and value is FreePBX, but we have no cause for concern there given what we know.

            Question - do you think that if Sangoma only made revenue off support contracts and the add-on modules they would exist as a company? i.e. if they dropped PBXact, etc - could they likely stay afloat?

            JaredBuschJ scottalanmillerS 2 Replies Last reply Reply Quote 0
            • JaredBuschJ
              JaredBusch @Dashrender
              last edited by JaredBusch

              @Dashrender said in Sangoma Ransomware:

              @scottalanmiller said in Sangoma Ransomware:

              1. FreePBX code impacted. <- No cause for concern but this is the key "panic" that people are promoting to try to make this into a big deal. I don't know anyone that is a Sangoma customer or why much of anyone would be, the kind of stuff that they make isn't stuff for modern businesses. What they make of importance and value is FreePBX, but we have no cause for concern there given what we know.

              Question - do you think that if Sangoma only made revenue off support contracts and the add-on modules they would exist as a company? i.e. if they dropped PBXact, etc - could they likely stay afloat?

              No, because that is why they bought FreePBX Schmoozecom and Digium.

              Sangoma has existed for decades as a hardware company, but that hardware revenue went south years ago.

              1 Reply Last reply Reply Quote 0
              • ObsolesceO
                Obsolesce @scottalanmiller
                last edited by

                @scottalanmiller said in Sangoma Ransomware:

                @JaredBusch said in Sangoma Ransomware:

                The concern is not the open source. The concern is closed source.

                Very true. Definitely any closed source from them is very suspect now as there's two risks...

                1. Attacks now know of security holes that weren't public simply by getting "read access" to the code.
                2. Compromised are injected because there's no community or repo protection against changes.

                Also the possibility of compromised cryptography keys, such as those used for SSL connections, that people seem to be concerned about.

                I don't use them, so not sure about the true nature of that threat though.

                JaredBuschJ 1 Reply Last reply Reply Quote 0
                • JaredBuschJ
                  JaredBusch @Obsolesce
                  last edited by

                  @Obsolesce said in Sangoma Ransomware:

                  Also the possibility of compromised cryptography keys, such as those used for SSL connections, that people seem to be concerned about.

                  Not for SSL. for digitally signing the modules. commercial and non-commercial.

                  ObsolesceO 1 Reply Last reply Reply Quote 0
                  • ObsolesceO
                    Obsolesce @JaredBusch
                    last edited by

                    @JaredBusch said in Sangoma Ransomware:

                    @Obsolesce said in Sangoma Ransomware:

                    Also the possibility of compromised cryptography keys, such as those used for SSL connections, that people seem to be concerned about.

                    Not for SSL. for digitally signing the modules. commercial and non-commercial.

                    Ah, okay. That makes more sense.

                    JaredBuschJ 1 Reply Last reply Reply Quote 0
                    • JaredBuschJ
                      JaredBusch @Obsolesce
                      last edited by JaredBusch

                      @Obsolesce said in Sangoma Ransomware:

                      @JaredBusch said in Sangoma Ransomware:

                      @Obsolesce said in Sangoma Ransomware:

                      Also the possibility of compromised cryptography keys, such as those used for SSL connections, that people seem to be concerned about.

                      Not for SSL. for digitally signing the modules. commercial and non-commercial.

                      Ah, okay. That makes more sense.

                      Oh also the SSH keys for remoting in to systems. I would say no issue there, but of course stupid people are stupid and I am sure a lot of people have them enabled needlessly.
                      2b49a4fe-2ac5-4b59-b645-3cebf8a8d37f-image.png

                      ObsolesceO 1 Reply Last reply Reply Quote 0
                      • ObsolesceO
                        Obsolesce @JaredBusch
                        last edited by Obsolesce

                        @JaredBusch said in Sangoma Ransomware:

                        @Obsolesce said in Sangoma Ransomware:

                        @JaredBusch said in Sangoma Ransomware:

                        @Obsolesce said in Sangoma Ransomware:

                        Also the possibility of compromised cryptography keys, such as those used for SSL connections, that people seem to be concerned about.

                        Not for SSL. for digitally signing the modules. commercial and non-commercial.

                        Ah, okay. That makes more sense.

                        Oh also the SSH keys for remoting in to systems. I would say no issue there, but of course stupid people are stupid and I am sure a lot of people have them enabled needlessly.
                        2b49a4fe-2ac5-4b59-b645-3cebf8a8d37f-image.png

                        Okay yeah, I seen SSL mentioned in the one first post, and SSH further down. But not being familiar with the products I didn't know anything beyond that. Perhaps the SSL one was a typo.

                        1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @Dashrender
                          last edited by

                          @Dashrender said in Sangoma Ransomware:

                          @scottalanmiller said in Sangoma Ransomware:

                          1. FreePBX code impacted. <- No cause for concern but this is the key "panic" that people are promoting to try to make this into a big deal. I don't know anyone that is a Sangoma customer or why much of anyone would be, the kind of stuff that they make isn't stuff for modern businesses. What they make of importance and value is FreePBX, but we have no cause for concern there given what we know.

                          Question - do you think that if Sangoma only made revenue off support contracts and the add-on modules they would exist as a company? i.e. if they dropped PBXact, etc - could they likely stay afloat?

                          They made profit before that stuff existed. So I think absolutely. That stuff is all just extra.

                          JaredBuschJ 1 Reply Last reply Reply Quote 0
                          • JaredBuschJ
                            JaredBusch @scottalanmiller
                            last edited by

                            @scottalanmiller said in Sangoma Ransomware:

                            @Dashrender said in Sangoma Ransomware:

                            @scottalanmiller said in Sangoma Ransomware:

                            1. FreePBX code impacted. <- No cause for concern but this is the key "panic" that people are promoting to try to make this into a big deal. I don't know anyone that is a Sangoma customer or why much of anyone would be, the kind of stuff that they make isn't stuff for modern businesses. What they make of importance and value is FreePBX, but we have no cause for concern there given what we know.

                            Question - do you think that if Sangoma only made revenue off support contracts and the add-on modules they would exist as a company? i.e. if they dropped PBXact, etc - could they likely stay afloat?

                            They made profit before that stuff existed. So I think absolutely. That stuff is all just extra.

                            No, they have said the new software sales far eclipsed their recent hardware sales

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @JaredBusch
                              last edited by

                              @JaredBusch said in Sangoma Ransomware:

                              @scottalanmiller said in Sangoma Ransomware:

                              @Dashrender said in Sangoma Ransomware:

                              @scottalanmiller said in Sangoma Ransomware:

                              1. FreePBX code impacted. <- No cause for concern but this is the key "panic" that people are promoting to try to make this into a big deal. I don't know anyone that is a Sangoma customer or why much of anyone would be, the kind of stuff that they make isn't stuff for modern businesses. What they make of importance and value is FreePBX, but we have no cause for concern there given what we know.

                              Question - do you think that if Sangoma only made revenue off support contracts and the add-on modules they would exist as a company? i.e. if they dropped PBXact, etc - could they likely stay afloat?

                              They made profit before that stuff existed. So I think absolutely. That stuff is all just extra.

                              No, they have said the new software sales far eclipsed their recent hardware sales

                              Eclipsed, but I assume that they original business is still functional. If FreePBX is all they have, that's rough.

                              1 Reply Last reply Reply Quote 0
                              • JaredBuschJ
                                JaredBusch
                                last edited by

                                Official statement posted.

                                https://www.sangoma.com/press-releases/sangoma-technologies-confirms-data-breach-as-result-of-ransomware-attack/

                                1 Reply Last reply Reply Quote 0
                                • Crosstalk SolutionsC
                                  Crosstalk Solutions
                                  last edited by

                                  Youtube Video

                                  JaredBuschJ 1 Reply Last reply Reply Quote 1
                                  • JaredBuschJ
                                    JaredBusch
                                    last edited by

                                    Updated official statement.
                                    https://www.sangoma.com/press-releases/sangoma-technologies-provides-update-regarding-data-breach/

                                    1 Reply Last reply Reply Quote 0
                                    • JaredBuschJ
                                      JaredBusch @Crosstalk Solutions
                                      last edited by

                                      @Crosstalk-Solutions said in Sangoma Ransomware:

                                      In video:

                                      I want to get ahead of speculation....

                                      Because you want your speculation to be the one everyone believes..

                                      This video is a load of crap.

                                      ObsolesceO 1 Reply Last reply Reply Quote 0
                                      • ObsolesceO
                                        Obsolesce @JaredBusch
                                        last edited by

                                        @JaredBusch said in Sangoma Ransomware:

                                        @Crosstalk-Solutions said in Sangoma Ransomware:

                                        In video:

                                        I want to get ahead of speculation....

                                        Because you want your speculation to be the one everyone believes..

                                        This video is a load of crap.

                                        fanboyism-598x300.jpg

                                        JaredBuschJ 1 Reply Last reply Reply Quote 0
                                        • JaredBuschJ
                                          JaredBusch @Obsolesce
                                          last edited by JaredBusch

                                          @Obsolesce said in Sangoma Ransomware:

                                          @JaredBusch said in Sangoma Ransomware:

                                          @Crosstalk-Solutions said in Sangoma Ransomware:

                                          In video:

                                          I want to get ahead of speculation....

                                          Because you want your speculation to be the one everyone believes..

                                          This video is a load of crap.

                                          fanboyism-598x300.jpg

                                          No, facts, not speculation.

                                          Did shit happen? Of course. No one is denying it.

                                          Does a ransomware of an exec/upper management mean an entire ecosystem is suddenly invalid? No. That is not how anything works.

                                          It does mean that things need to be considered, risks weighed, and actual intelligent thought made.

                                          1 Reply Last reply Reply Quote 1
                                          • JaredBuschJ
                                            JaredBusch
                                            last edited by

                                            Chris had only one actual goal by making that video when he did and as he did.

                                            Revenue.

                                            NashBrydgesN 1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 3
                                            • 2 / 3
                                            • First post
                                              Last post