Copy Link
Add to Bookmark
Report

PBX Fraud Detection

eZine's profile picture
Published in 
Adrenalin
 · 1 year ago
PBX Fraud Detection
Pin it

Author: iDH Staff


"I can't believe it. I passed your articles on hackers around the office just three weeks ago. Now I'm looking at our PBX and we're being hacked. What can I do?"

Let me tell you, a call like that wakes an editor up from his afternoon nap fast. The concern in Richard Deal's voice is evident. "They're hacking you now?" I ask, disbelieving.

"Yes. Now. They used our 800 number and got in through our mailbox. The mailbox people tell me 'no way,' but it's happening. I don't even know if our number is still out on some bulletin board service."

I look at the clock. Just after 3 p.m. on an otherwise normal Wednesday.

"Who's your long-distance carrier and what kind of system are you running on?" I ask.

Johnson Controls, Deal's employer, has a Mitel PBX, VMX mailboxes, and uses MCI as a long-distance carrier. I refer Deal to the Communications Fraud Control Association in Washington, D.C. (202-298-8900) as the best resource center. They keep tabs on purloined access codes and hacked mailboxes. If your firm isn't part of the CFCA, it probably should be.

Meantime, I volunteer to contact MCI's security people. By 3:22 Jack Van Wagner, MCI's senior manager of investigations, is taking details - sounding just like the former cop he is. Shortly thereafter, MCI's Atlanta investigators report that their own internal systems have alerted them to a possible fraud case because of the number of calls going from Alabama to area code 809 (always block the Caribbean from any PBX). Johnson Controls' outbound 800 lines are blocked.

VMX's distributor initially denies that the system is hackable. But at VMX's San Jose offices, Lisa French states that "It is always possible to hack any system. You design to minimize risk, but it can be done." The Johnson Controls case is another entry in VMX's ongoing program to collect anti-fraud data and send it to distributors and clients. Combine the powerful trunk-to-trunk capability of the PBX with the outdial capability of voice mail and call away.

In this case the hacker was doubly clever, recognizing the need to dial an access code for the Essx centrex service.

Will the bad guys be caught? "Odds of catching the perpetrators depends on where it came from," Van Wagner tells me the next day. "It probably came from 125th Street in New York where they have phone houses. On a scale of 1 to 10, odds are a minus-200. But if it came from a university in Wisconsin, chances are good." Whether calls were looped through two or three PBXs or whether more than one carrier is involved also are factors. Most LD carriers try to be proactive, but there always is risk in shutting down lines being used for legitimate calls and incurring customer wrath. VMX, meantime, has put together a package for users, available through its distributors. Much of the material is fraud prevention 101 (secure DISA ports, set up toll control). But it is amazing how many unsecured systems there are. Is yours one of them?

← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT