https://community.bt.com/t5/BT-Infi...ly-over-VOIP-over-700-in-one-day/td-p/1242307
We have a dedicated BT Infinity line installed with a BT hub attached. There is NO phone attached to the socket !!
Over the Easter break BT claim that over £700 of calls were made from a building that was entirely vacant.
There is one CCTV device connected to BT Hub and port forward rule is in place. I have personally checked the setup and cannot see anything that is incorrect. The BT Fraud team have advised that the problem is ours and it was likely an automated attack. They also advised it was possibly done over VOIP.
Our BT account manager is also confused by this too. As VOIP calls would apparently appear on a broadband bill not a landline bill.
I have searched the logs on the hub during that time and cannot see anything that looks odd.
Does anyone have any ideas what might have happened?
07:50:13, 20 Apr. ath0: STA 00:ac:54:e5:07:da IEEE 802.11: WiFi registration failed
07:50:01, 20 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client associated
07:50:01, 20 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client disassociated
07:45:22, 20 Apr. ath0: STA 00:ac:54:e5:07:da IEEE 802.11: WiFi registration failed
07:45:10, 20 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client associated
07:39:25, 20 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client disassociated
07:39:15, 20 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client associated
08:48:21, 18 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client disassociated
07:29:17, 20 Apr. (6875243.070000) OpenWiFi_1 IPSec connection is down
07:12:22, 20 Apr. (6874228.930000) OpenWiFi_1 IPSec connection is up
02:04:16, 20 Apr. (6855742.380000) CWMP: session completed successfully
02:04:16, 20 Apr. (6855742.170000) CWMP: HTTP authentication success from https://pbthdm.bt.mo
02:04:06, 20 Apr. (6855732.090000) CWMP: Server URL: https://pbthdm.bt.mo; Connecting as user: ACS username
02:04:06, 20 Apr. (6855732.090000) CWMP: Session start now. Event code(s): '4 VALUE CHANGE'
02:04:02, 20 Apr. (6855728.910000) WAN operating mode is Ethernet
02:04:02, 20 Apr. (6855728.910000) Last WAN operating mode was Ethernet
02:04:02, 20 Apr. (6855728.860000) PPPoE is up
02:04:02, 20 Apr. (6855728.390000) PPP IPCP Receive Configuration ACK
02:04:02, 20 Apr. (6855728.380000) PPP IPCP Send Configuration Request
02:04:02, 20 Apr. (6855728.380000) PPP IPCP Receive Configuration NAK
02:04:02, 20 Apr. (6855728.380000) PPP IPCP Send Configuration ACK
02:04:02, 20 Apr. (6855728.370000) PPP IPCP Receive Configuration Request
02:04:02, 20 Apr. (6855728.370000) PPP IPCP Send Configuration Request
02:04:02, 20 Apr. (6855728.370000) CHAP authentication successful
02:04:02, 20 Apr. (6855728.350000) CHAP Receive Challenge
02:04:02, 20 Apr. (6855728.320000) Starting CHAP authentication with peer
02:04:02, 20 Apr. (6855728.320000) PPP LCP Receive Configuration ACK
02:04:02, 20 Apr. (6855728.320000) PPP LCP Send Configuration ACK
02:04:02, 20 Apr. (6855728.320000) PPP LCP Send Configuration Request
02:04:02, 20 Apr. (6855728.320000) PPP LCP Receive Configuration Request
02:04:02, 20 Apr. (6855728.230000) CHAP Receive Challenge
02:04:02, 20 Apr. (6855728.230000) Starting CHAP authentication with peer
02:04:02, 20 Apr. (6855728.230000) PPP LCP Receive Configuration ACK
02:04:02, 20 Apr. (6855728.220000) PPP LCP Send Configuration Request
02:04:02, 20 Apr. (6855728.220000) PPP LCP Receive Configuration Reject
02:04:02, 20 Apr. (6855728.220000) PPP LCP Send Configuration ACK
02:04:02, 20 Apr. (6855728.220000) PPP LCP Receive Configuration Request
02:04:02, 20 Apr. (6855728.220000) PPP LCP Send Configuration Request
02:03:33, 20 Apr. (6855699.310000) CWMP: session closed due to error: Could not resolve host
02:03:32, 20 Apr. (6855698.110000) CWMP: Server URL: https://pbthdm.bt.mo; Connecting as user: ACS username
02:03:32, 20 Apr. (6855698.110000) CWMP: Session start now. Event code(s): '4 VALUE CHANGE'
02:03:31, 20 Apr. (6855697.710000) CWMP: Initializing transaction for event code 4 VALUE CHANGE
02:03:31, 20 Apr. (6855697.270000) PPP LCP Send Termination Request [PPPoE PADT received]
02:03:26, 20 Apr. (6855692.600000) PPPoE is down after 1370 minutes uptime [Disconnected]
02:03:24, 20 Apr. (6855690.410000) PPP LCP Send Termination Request [Peer not responding]
01:10:21, 20 Apr. (6852507.070000) OpenWiFi_1 IPSec connection is down
00:55:19, 20 Apr. (6851606.030000) OpenWiFi_1 IPSec connection is up
22:32:34, 19 Apr. (6843040.490000) OpenWiFi_1 IPSec connection is down
21:48:11, 19 Apr. (6840377.350000) OpenWiFi_1 IPSec connection is up
20:52:16, 19 Apr. (6837022.300000) OpenWiFi_1 IPSec connection is down
20:37:09, 19 Apr. (6836115.260000) OpenWiFi_1 IPSec connection is up
20:28:48, 19 Apr. (6835614.610000) OpenWiFi_1 IPSec connection is down
20:00:23, 19 Apr. (6833909.570000) OpenWiFi_1 IPSec connection is up
We have a dedicated BT Infinity line installed with a BT hub attached. There is NO phone attached to the socket !!
Over the Easter break BT claim that over £700 of calls were made from a building that was entirely vacant.
There is one CCTV device connected to BT Hub and port forward rule is in place. I have personally checked the setup and cannot see anything that is incorrect. The BT Fraud team have advised that the problem is ours and it was likely an automated attack. They also advised it was possibly done over VOIP.
Our BT account manager is also confused by this too. As VOIP calls would apparently appear on a broadband bill not a landline bill.
I have searched the logs on the hub during that time and cannot see anything that looks odd.
Does anyone have any ideas what might have happened?
07:50:13, 20 Apr. ath0: STA 00:ac:54:e5:07:da IEEE 802.11: WiFi registration failed
07:50:01, 20 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client associated
07:50:01, 20 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client disassociated
07:45:22, 20 Apr. ath0: STA 00:ac:54:e5:07:da IEEE 802.11: WiFi registration failed
07:45:10, 20 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client associated
07:39:25, 20 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client disassociated
07:39:15, 20 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client associated
08:48:21, 18 Apr. ath0: STA 44:a7:cf:b8:cd:7f IEEE 802.11: Client disassociated
07:29:17, 20 Apr. (6875243.070000) OpenWiFi_1 IPSec connection is down
07:12:22, 20 Apr. (6874228.930000) OpenWiFi_1 IPSec connection is up
02:04:16, 20 Apr. (6855742.380000) CWMP: session completed successfully
02:04:16, 20 Apr. (6855742.170000) CWMP: HTTP authentication success from https://pbthdm.bt.mo
02:04:06, 20 Apr. (6855732.090000) CWMP: Server URL: https://pbthdm.bt.mo; Connecting as user: ACS username
02:04:06, 20 Apr. (6855732.090000) CWMP: Session start now. Event code(s): '4 VALUE CHANGE'
02:04:02, 20 Apr. (6855728.910000) WAN operating mode is Ethernet
02:04:02, 20 Apr. (6855728.910000) Last WAN operating mode was Ethernet
02:04:02, 20 Apr. (6855728.860000) PPPoE is up
02:04:02, 20 Apr. (6855728.390000) PPP IPCP Receive Configuration ACK
02:04:02, 20 Apr. (6855728.380000) PPP IPCP Send Configuration Request
02:04:02, 20 Apr. (6855728.380000) PPP IPCP Receive Configuration NAK
02:04:02, 20 Apr. (6855728.380000) PPP IPCP Send Configuration ACK
02:04:02, 20 Apr. (6855728.370000) PPP IPCP Receive Configuration Request
02:04:02, 20 Apr. (6855728.370000) PPP IPCP Send Configuration Request
02:04:02, 20 Apr. (6855728.370000) CHAP authentication successful
02:04:02, 20 Apr. (6855728.350000) CHAP Receive Challenge
02:04:02, 20 Apr. (6855728.320000) Starting CHAP authentication with peer
02:04:02, 20 Apr. (6855728.320000) PPP LCP Receive Configuration ACK
02:04:02, 20 Apr. (6855728.320000) PPP LCP Send Configuration ACK
02:04:02, 20 Apr. (6855728.320000) PPP LCP Send Configuration Request
02:04:02, 20 Apr. (6855728.320000) PPP LCP Receive Configuration Request
02:04:02, 20 Apr. (6855728.230000) CHAP Receive Challenge
02:04:02, 20 Apr. (6855728.230000) Starting CHAP authentication with peer
02:04:02, 20 Apr. (6855728.230000) PPP LCP Receive Configuration ACK
02:04:02, 20 Apr. (6855728.220000) PPP LCP Send Configuration Request
02:04:02, 20 Apr. (6855728.220000) PPP LCP Receive Configuration Reject
02:04:02, 20 Apr. (6855728.220000) PPP LCP Send Configuration ACK
02:04:02, 20 Apr. (6855728.220000) PPP LCP Receive Configuration Request
02:04:02, 20 Apr. (6855728.220000) PPP LCP Send Configuration Request
02:03:33, 20 Apr. (6855699.310000) CWMP: session closed due to error: Could not resolve host
02:03:32, 20 Apr. (6855698.110000) CWMP: Server URL: https://pbthdm.bt.mo; Connecting as user: ACS username
02:03:32, 20 Apr. (6855698.110000) CWMP: Session start now. Event code(s): '4 VALUE CHANGE'
02:03:31, 20 Apr. (6855697.710000) CWMP: Initializing transaction for event code 4 VALUE CHANGE
02:03:31, 20 Apr. (6855697.270000) PPP LCP Send Termination Request [PPPoE PADT received]
02:03:26, 20 Apr. (6855692.600000) PPPoE is down after 1370 minutes uptime [Disconnected]
02:03:24, 20 Apr. (6855690.410000) PPP LCP Send Termination Request [Peer not responding]
01:10:21, 20 Apr. (6852507.070000) OpenWiFi_1 IPSec connection is down
00:55:19, 20 Apr. (6851606.030000) OpenWiFi_1 IPSec connection is up
22:32:34, 19 Apr. (6843040.490000) OpenWiFi_1 IPSec connection is down
21:48:11, 19 Apr. (6840377.350000) OpenWiFi_1 IPSec connection is up
20:52:16, 19 Apr. (6837022.300000) OpenWiFi_1 IPSec connection is down
20:37:09, 19 Apr. (6836115.260000) OpenWiFi_1 IPSec connection is up
20:28:48, 19 Apr. (6835614.610000) OpenWiFi_1 IPSec connection is down
20:00:23, 19 Apr. (6833909.570000) OpenWiFi_1 IPSec connection is up

