Learn about PBX Fraud on the Magna5 Knowledge Base

Cybersecurity month is quickly coming to an end. We discussed many topics this month, including CryptoBlackmail, Vulnerability Management, and Risk and Compliance Challenges. With the release of our new Knowledge Base and an increase in fraudulent activity, we wanted to discuss some educational and best practices of PBX fraud prevention that can be found in the Knowledge Base.

So, what is business phone system hacking?

Business phone system hacking is unauthorized or fraudulent activities that can affect your telephone system, and potentially cost your organization thousands of dollars. Unfortunately, with this type of compromise organizations don’t realize the fraudulent activity until malicious activities begin or they received a huge bill from their provider.

Why does a threat actor target a phone system?

Threat actors will infiltrate a vulnerable business phone system to make international or long distance calls, listen to voice mails, or monitor conversations. Threat actors will also sell the use of the company’s phone system to others for fraudulent activity.

How do threat actors gain access to a phone system?

Threat actors gain access to a phone system through the PBX’s maintenance port, voicemail, or the Direct Inward System Access (DISA).

Since phone systems are software based, threat actors can access the PBX remotely through the maintenance port. The maintenance port is how administrators manage their PBX. If a threat actor can get control of the maintenance port, they can make changes that can severely impact your business such as, call routing configuration, passwords, and extensions. They could even shut down your PBX entirely.

Since voicemail can be accessed remotely to program outbound voice calls, threat actors can use this feature to create a “phantom” mailbox. This phantom mailbox will supply a dial tone, allowing them to make calls from your business account. Once they have access to this, they can listen to your voicemails, change your greeting, or delete your messages.

Beware of DISA

DISA (Direct Inward System Access) is a feature which allows a user to access the phone system from external sources. For example, a user could use their mobile device to connect into the phone system in order to check voicemail, place calls, dial extensions and more. If a threat actor gains access to the DISA feature, they can make tolled calls on an outside line, at the cost of your business.

While there is no system that is 100% protected, implementing industry best practices can help keep your business secured. Visit our Knowledge Base for industry guidelines that can help reduce the risk of business phone system compromise.

Our Knowledge Base if full of useful information that can help you better control your interactions with your Magna5 services. For help, visit help.magna5global.com.

WordPress Appliance - Powered by TurnKey Linux