Toll fraud hackers try to dial into a voice mailbox and then execute a transfer by dialing *T. The hacker then dials an access code (either 9 for Automatic Route Selection or a pooled facility code), followed by the appropriate digit string to either direct dial or access a network operator to complete the call.
![]() |
All extensions are initially, and by default, restricted from dial access to pools. In order for an extension to use a pool to access an outside line/trunk, this restriction must be removed. |
Preventive Measures
Take the following preventive measures to limit the risk of unauthorized transfers by hackers:
![]() |
SECURITY ALERT: |
The MERLIN MAGIX Integrated System ships with ARS activated with all extensions set to Facility Restriction Level 3, allowing all international calling. To prevent toll fraud, ARS Facility Restriction Levels (FRLs) should be established using:
|
![]() |
WARNING: |
Default local and default toll tables are factory-assigned an FRL of 2. This simplifies the task of restricting extensions: the FRL for an extension merely needs to be changed from the default of 3. |
![]() |
WARNING: |
Each extension should be assigned the appropriate FRL to match its calling requirements. All voice mail port extensions not used for Outcalling should be assigned to FRL 0 (the factory setting). |
![]() |
Assign all voice mail port extensions to this Disallowed List. Avaya Communication recommends assigning Disallowed List number 7. This is an added layer of security, in case outward restriction is inadvertently removed. (Voice messaging ports are assigned, by default, to Disallowed List number 7.) |
Additional general security for voice messaging systems: