Introduction

Created by Sagecom Support, Modified on Wed, 09 Aug 2023 at 12:14 AM by Sagecom Support

Security is a cornerstone of every VoIP service. Since 2002, Telinta has helped our customers defend against fraud. Please use the resources we provide here as part of your own overall research to learn more about fraud. You may also choose to research what your VoIP Termination carriers and other providers offer as fraud protection. According to published industry sources, the rate of fraud has become an important issue for service providers.

According to the Communication Fraud Control Association 2019 Global Fraud Loss Survey, the top five fraud methods carriers reported were:

- Subscription Fraud (Application)

- Payment Fraud - PBX Hacking

- IP PBX Hacking

- Wangiri (Call Back Schemes)


VoIP Vulnerabilities

Call Fraud

Fraudsters can send calls pretending to be someone else and can route long distance, international and premium rate calls. This can cause major financial loss in very short time. Fraud is a common problem across all industries, but it has become a major issue for VoIP users and providers.

PBX Hacking

Fraudsters who can exploit the vulnerabilities of the IP PBX and gain access to the system are able to generate a significant amount of traffic. PBX hacking is a common technique used with Domestic and International Revenue Share Fraud and Call Transfer Fraud,as well as other schemes. Revenue Share Fraud is where fraudsters profit by driving traffic to premium numbers for which they earn money for each inbound minute.

Phishing

Phishing is very common in the email world. Voice phishing is the criminal practice of using social engineering over the telephone to gain access to private personal and financial information from the public. It is sometimes referred to as vishing, a word that is a combination of "voice" and phishing. Voice phishing is typically used to steal credentials, credit card numbers or other information.

Caller ID Spoofing

Caller ID Spoofing is the practice of sending phony Caller ID to the recipient of a phone call. It can be used to fraudulently impersonate a trusted vendor(such as a bank), a law enforcement agency,or another subscriber. This type of fraud can also be used withPinless services, when fraudsters can place calls to premium or expensive destination.

False Answer Supervision

A misconfiguration of telco equipment, by negligence or design, can cause billing to start as soon as the call is placed, even if the called party is busy or does not answer. The cost is typically subtle but recurring and can result in significant loss for wholesale providers.

Subscription Fraud

This involves signing up for a service with a bogus name, and no intention to pay. Use of fake credit card information in the signup form is also common. After signing up, Fraudsters usually utilize the Domestic and International Revenue Share Fraud.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article