WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts

Similar documents
PBX Fraud Information

PBX Fraud Educational Information for PBX Customers

International Dialing and Roaming: Preventing Fraud and Revenue Leakage

PBX Security in the VoIP environment

Concept Note. powering the ROC. PBX Hacking.

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

CCT Telecomm offers the following tips to ensure your protection from phone fraud at your home or business:

Anti Fraud Services. Associate Member of..

6 Steps to SIP trunking security. How securing your network secures your phone lines.

VOIP THEFT OF SERVICE: PROTECTING YOUR NETWORK ======

Business Telephony Security

TELECOM FRAUD CALL SCENARIOS

8335 Guilford Road Suite H Columbia MD

How To Protect A Call Center From Fraud

Recommendations for secure deployment of an IP-PBX

Hosted Business Class VoIP Features

With 360 Cloud VoIP, your company will benefit from more advanced features:

Hackers: Detection and Prevention

BP_UserGuide_1113. Business Phone User Guide

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

INTRODUCTION TO VOIP FRAUD

Position Paper Toll fraud prevention Lock thieves out of your phone system

Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud

Auto Attendants. Call Management

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers

Feature Reference. Features: Call Forwarding Call Waiting Conference Calling Outbound Caller ID Block Last Call Return Voic

AUTO ATTENDANTS CALL MANAGEMENT

BP_UserGuide_0113. Business Phone User Guide

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

Hosted VoIP Feature Set

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Communications Fraud Control Association Global Fraud Loss Survey

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Vishing (and SMiShing ) Countermeasures

IPitomy User Guide Business Phones Conferencing Voice Mail

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

International Carriers

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

NATIONAL CYBER SECURITY AWARENESS MONTH

NICC ND 1438 V1.1.1 ( )

Learn to protect yourself from Identity Theft. First National Bank can help.

Battling illegal call operations with Fraud Management Systems

Welcome to Cogeco Business Digital Phone Service

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Device SIP Trunking Administrator Manual

The Business Value of Call Accounting

Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08

Telephone User Guide 1

HELPFUL HINTS FOR VOIP PHONES

Franchise Data Compromise Trends and Cardholder. December, 2010

The question is what kind of VoIP do you want? What are the tradeoffs today?

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Grandstream Networks, Inc.

Cloud9 Hosted PBX Feature Guide

VOIP Attacks On The Rise

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Managing IT Security with Penetration Testing

Telecommunications Fraud Organized approaches to fight it

NGT Hosted Digital Voice. User Guide

VOICE OVER IP THAT BOOSTS BUSINESS EFFICIENCY- TEN TIPS FOR GETTING IT RIGHT

Grandstream Networks, Inc. UCM6100 Security Manual

All Rights Reserved. Release 5.6, March 2009

Safeguarding Networks Against Fraud. Connections 2014

Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty

Automatic Route Selection (ARS)

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

All Rights Reserved. Copyright 2009

Reference Guide Table of Contents

Protect your Business phone systems from FRAUD!


Identity Theft Protection

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

RING CYCLES ADMINISTRATIVE LINE FEATURES. AUTO DIAL Electronic Sets: 1. To program, press AUTO DIAL key 2. Dial number to be stored

SPICE EduGuide EG0015 Security of Administrative Accounts

YOUR HOME PHONE. Horry Telephone Cooperative, Inc.

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

System administration quick reference guide Norstar MICS, CICS, & Call Pilot Systems.

Managed Security Monitoring: Network Security for the 21st Century

Hosted PBX Features List

Transcription:

WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts

OUTLINE Overview...3 What is Telecom Fraud...4 Different Types of Fraud...5 A Look at the Top 5...6 What is a PBX... 10 PBX Hacking A Big Problem...11 PBX Hacking... 12 How is it Done...13 It Can Happen to You... 14 How to Prevent... 15 Summary...17 Page 2 Outline

OVERVIEW Telecommunications fraud continues to be a big problem in the industry today. Advancements in technology have made life easier and more convenient for most people today, but not without a price. These advancements not only bring innovation for good, but they also bring about increasingly sophisticated practices in which fraudsters can infiltrate a company. Communication Service providers are faced with enough challenges from competition, declining ARPU, lower margins and other growth-related challenges. While paying more attention to these other areas, it can leave them vulnerable to unsuspecting attacks. With fraud continuing to be a big problem, fraud management has evolved from a defensive and reactive strategy focused on prevention to a more proactive, revenue generating and innovative approach. Goals have shifted from simply detecting fraud to achieving higher customer satisfaction and creating new revenue streams. In this e-book, we will not only outline the top types of fraud effecting the industry today, but we will also recommend best practices to help fight fraud and try to prevent it before it occurs. Page 3 Overview

WHAT IS TELECOM FRAUD Telecommunication fraud is defined as the theft of telecommunication services or the use of telecommunication service to commit other forms of fraud. This type of fraud happens on a daily basis, sometimes without anyone knowing until the damage has already been done. Fraud primarily occurs to a company with a weak defense system. Billing systems and network vulnerabilities are easily exploited to gain access, when if proper procedures were put in place, could have easily been prevented. With new voice technologies becoming more attractive, improperly installed systems can be infiltrated easily and put a small company out of business in mere minutes. For example, a technology such as Voice over Internet Protocol (VoIP) uses the Internet to make and receive phone calls, and not infrastructure owned by the traditional telephone networks. Because of it s affordability, some businesses try to install their own PBX systems using an under qualified individual which can result in security leaks and cracks that can be easily exploited. Page 4 What is Telecom Fraud

DIFFERENT TYPES OF FRAUD According to the Communications Fraud Control Association (CFCA) 2011 Global Fraud Loss Survey, the CFCA estimates that Telecom Fraud costs the industry over $40 Billion(USD) annually. This equates to almost 2% of telecom revenues that cannot be reported on a companies income statement. The survey also outlines the Top 5 Fraud Types as follows: 1. PBX/Voice mail systems $4.96B 2. Subscription/Identity(ID)Theft $4.32B 3. International Revenue Share Fraud (IRSF) $3.84B 4. By-Pass Fraud $2.88B 5. Credit Card Fraud $2.40B For more information on this survey, please visit: www.cfca.org/fraudlosssurvey With PBX Fraud being the most costly, we ll dig a little deeper into the types and issues Communications Service Providers face. But before we go into detail pertaining to PBX Fraud, let s take a look at some of the other types of fraud that made the top 5 list and are top of mind for revenue assurance managers around the world. Page 5 Different Types of Fraud

A LOOK AT THE TOP 5 SUBSCRIPTION IDENTITY THEFT Subscription ID Theft occurs when a subscriber uses false identification or uses an unsuspecting victims ID to obtain service. The Internet is a virtual goldmine of personal information that fraudsters can easily access and use to create false identities. Once these identities are created, they can use it to obtain all kinds of products and services. Communication Service Providers should ensure they have a system in place capable of detecting and combating fraud. Some service providers currently maintain their own fraud databases. Others have begun implementing personal verification and prepaid systems. Page 6 A Look at the Top 5 Subscription Identity Theft

A LOOK AT THE TOP 5 INTERNATIONAL REVENUE SHARE FRAUD International Revenue Share Fraud (IRSF) occurs when hackers obtain Subscriber Identity Management numbers (SIMs) from a Communication Service Providers home network and connect them to gain international roaming status to begin placing outgoing international calls. The opportunity for fraudsters to exploit some countries high termination rates, or inflate traffic into other high value numbers with the intention of sharing any revenue generated from this activity, has been a problem for CSP s for some years now. Many of these opportunities are created through number aggregator websites who openly advertise revenue share offerings to many countries, and invite visitors to their websites to register on-line and immediately start generating revenue. Fraudsters are constantly searching for a weak link. Service Providers should ensure that they have sufficiently secure controls in place to prevent any outsiders from using their network as an enabler for Revenue Share Fraud. Page 7 A Look at the Top 5 International Revenue Share Fraud

A LOOK AT THE TOP 5 BY-PASS FRAUD By-Pass Fraud occurs when in-bound off-net traffic is disguised as on-net traffic (By-Pass) to avoid high costs of terminating traffic. Most By-Pass operations are performed on a large scale utilizing advanced SIM- Boxes that can be managed from anywhere. Content Service Providers attacked can experience significant losses in their in-bound interconnect revenues. Service providers should constantly monitor in-bound and on-net traffic in order to detect any indications associated with By-Pass Fraud, such as suspected calling numbers or suspicious call pattern tendencies. Page 8 A Look at the Top 5 By-Pass Fraud

A LOOK AT THE TOP 5 CREDIT CARD FRAUD Credit Card Fraud occurs when someone uses a credit card as a fraudulent source of funds in a transaction to obtain goods without paying or to obtain unauthorized funds from an account. Today, many Communications Service Providers accept credit card and e-payments for services. A fraudster will try to make payment for those services using a third party credit card number. When the original card holder receives their bill and notices the charges, they ll typically dispute the charges and refuse to pay. Service providers should make sure safeguards are in place that limit the amount of payment which can be made through a credit card, as well as monitor the payments of multiple bills using the same credit card number. Page 9 A Look at the Top 5 Credit Card Fraud

WHAT IS A PBX? PBX (Private Branch Exchange) systems started out as an internal company switchboards where operators manually directed calls from one person to the next. By the time the 80 s rolled around, manual switchboards had been thrown aside, replaced with automatic switchboards that could route the call by itself. Fast forward to today, where PBX technology is taking on a whole new realm, the Internet world. Instead of routing calls through old switchboards and circuits, today s solutions use Internet protocol to exchange information. This new world also enables users to work from virtually anywhere while still experiencing the full benefit of their networks PBX features. But, as we ve stated previously, there s sometimes a cost associated with advancements in technology. For every worker able to telecommute from the beach, you can bet there s some hacker on that beach right next to him trying to see how they can gain access to that same network. Page 10 What is a PBX?

PBX HACKING A BIG PROBLEM PBX hacking the act of breaking into and accessing a company s PBX system and selling long distance/international telephone time to third parties remains one of the leading types of fraud around the world. It s also nothing new, having first been reported in 2005. Since then, it has consistently been one of the main computer crimes reported to Fraud investigators all over the world. Telephone hackers can take over insecure PBX systems to make international and long distance calls, listen to voice mail or monitor conversations. The main economic reason fraudsters hack PBX systems is to gain access to the trunk lines after which they begin generating as many calls as possible to international premium rate numbers that they own off which the criminal collects 90% revenue. Many businesses are unaware that they are responsible for all calls made from their phone system, including any fraudulent calls. More so, victims of hacked PBX systems are typically unaware of any unauthorized use and unwittingly allow the hackers to sell the use of their telephone system to others or, far worse give the hackers the opportunity to maliciously reprogram the system. Page 11 PBX Hacking A Big Problem

PBX HACKING WHY SHOULD I CARE? There are many issues and headaches surrounding PBX Fraud, but the main reason Communication Service Providers and businesses in general need to realize the importance of preventing PBX attacks is economics. With close to $5B in revenue lost to PBX Hacking, it s surprising that some companies still choose to not put effective counter measures in place. With PBX technology having been around for so long, phone hackers (also known as phreakers) have had decades to look for potential vulnerabilities to exploit. Couple that with the fact that there are a relatively small number of companies in the PBX equipment arena, an attacker that takes the time to learn two or three brands of PBX systems can have critical knowledge to attack over 70% of the possible targets. While new data and Internet products are being touted as the next big thing, often receiving big budgets and headcount, PBX technology is often viewed as only needing regular maintenance to keep it running. This lack of attention and focus can enable hackers to have a field day on unsuspecting victims. Page 12 PBX Hacking Why Should I Care?

HOW IS IT DONE? Phreakers can identify target systems either by searching phone directories for phone numbers of organizations that use a PBX, or by using a war dialer program on a computer that walks through sequences of phone numbers. Most PBXs today are software driven. When not properly configured, hackers can gain access to the system remotely by accessing remote features intended to make the users life easier and more efficient. Those remote features include: Voice Mail Some voicemail systems can be accessed remotely and programmed to make outbound voice calls. Hackers make use of this feature to forward calls to a phantom mail box that will give a dial tone, allowing them to make calls from anywhere, on the hacked business account. Hackers can also gain access to a mailbox to listen to messages, change greetings or delete messages entirely. Maintenance Port PBX administrators usually manage their PBX system via a maintenance port, by connecting remotely into their system. By controlling this PBX maintenance port, hackers can change the call routing configuration, passwords and can delete or add extensions or shut down a PBX, all of which can have a negative impact on business operations. DISA DISA is a feature that enables remote users to access an outside line via a PBX with authorization codes. This is a very useful feature for employees who are on the road a lot or who frequently make long distance calls or need to access an international call conference after business hours. By gaining access to this, hackers can access an outside line and make calls at the cost of the business. Page 13 How is It Done?

IT CAN HAPPEN TO YOU Typically, phreakers are highly skilled phone engineers that can strike anywhere at anytime. Most attacks typically occur after normal business hours or on holidays when intrusions are least likely to be detected. In 2011, a quartet of hackers based in the Philippines were arrested for hacking into AT&T and other telecommunications companies for millions, which they channeled to their own bank accounts and to accounts associated with a terrorist organization. Working from the Philippines during the day, these phreakers would dial numbers of US businesses after hours to attempt to gain access to phone systems through unused extensions on the system or other extensions with default passwords in place. Using a brute force approach where they systematically worked through phone extensions and pass codes with the aid of dialing software, the phreakers would gain access to extensions, change their passwords and then use the hacked extension to make outbound calls using the DISA number. While many hackers do it for the thrill of it, these phreakers conducted phone fraud on an epic level, turning exploited PBXs into their very own long-distance service. They also used their access to place calls to high-rate international premium-rate services the equivalent of 900 numbers in the US, where customers are assessed a per-minute fee on their phone bill for services. At least some of the revenue generated from the calls was reported to be $2 million through AT&T alone. Page 14 It Can Happen to You

HOW TO PREVENT IT Putting secure measures in place to fully secure your system is the first step to prevent hackers from gaining access and limit the potential damage and revenue implications that could effect your business as a result. The following are some recommended industry best practice guidelines that, if followed could help reduce the risk of telephone hacking. Knowledge and Awareness Knowledge is power. Everyone in your organization should understand and recognize the dangers and implications telephone hacking can have on your business. Key Measures should be taken to: Educate staff on security procedures and ensure they understand the potential ramifications Ensure procedures s are in place in case of any attack or red flags Familiarize yourself with your business call patterns and monitor them regularly The more you and your employees know, the more empowered you ll be if and when an attack does occur. Page 15 How to Prevent It

HOW TO PREVENT IT GENERAL SECURITY Security is of the utmost importance in all areas of business. Hackers are armed with the same information you are, and typically, are one step ahead. Ensuring that your system is secure can make the difference between a good day and being out of business. Passwords they hold the key to your castle and should be impenetrable Restrict use of default system codes and enforce rules to ensure passwords are secure Enforce password expiration dates to regulate frequent change Passwords should be lengthy, random and include characters, numbers and letters Know Your Business attention to detail can make you proactively detect any irregularities or issues Remove any inactive mailboxes or extensions Monitor your system frequently to easily identify irregularities and look for suspicious activity Evaluate your current settings and disable any features that are not in use Restricted Access keep certain passwords and features under a tight leash to ensure no issues arise Disable the external call forwarding feature in voice mail, unless it is absolutely required Restrict access to international or long distance destinations to which your company does not require access. Restrictions should include 1-900 calls Limit the DISA access number and authorization codes to only employees that have a real need for such a feature Page 16 How to Prevent It General Security

SUMMARY Telecom Fraud is a big business. It can not only put companies out of business, it can enrich and enable criminals to inflict much more than monetary harm. The better educated and informed you are, the better you will be protected from all the risks. By staying on top of the current threats and security measures, you can secure your network and ensure that your business is not taken by surprise. Phone Hackers look for the easiest targets and tend to not focus on systems with properly implemented security in place. As with many crimes of opportunity some hackers may be lazy and look for an easier target once they realize they can t penetrate a system. Since their end goal is to find any vulnerable system that would allow them to make international calls rather than access data, they will have no reason to invest their time in cracking your security. Until businesses realize the seriousness of security threats and invest the time to make sure their telecom services are safe and secure, telecommunications fraud will continue to be a big business that continues to put people out of business. Page 17 Summary

INTRODUCING NEUSTAR COMMUNICATIONS ANALYTICS Neustar provides expert insight and analytics that allow businesses to take their data and create valuable information assets that can be specifically used to improve business efficiency, minimize risk and drive revenues. Often one fraud problem is linked to other issues of fraud, revenue offer and cost management. Content Service Providers need to be sure that all systems are in sync and shared amongst functional groups. Neustar s Communications Analytics Services are a completely managed business assurance solution that looks across your entire organization to identify problems and implement results. Our experts can do the work for you, lightening your work load and saving you money in the process that can pay for the solution itself in months. PBX fraud prevention is only one part of a suite of integrated solutions offered by Neustar. The full service suite includes: Revenue Assurance, Risk Management, Margin Management and Sales Performance Management. All in a completely managed service offering. Let us help you find the right combination of solutions for your business. Page 18 Introducing Neustar Communications Analytics

NEUSTAR COMMUNICATION ANALYTICS For more information, visit us on the web at: www.neustar.biz/carrier-services/networking-solutions/leverage-data-assets Page 19 Neustar Communication Analytics

V1-05/09/2013-27