The telecommunications industry faces a growing threat of theft
of customer services. No telecommunications system can be totally
free from the risk of unauthorized usages. Securing the telecommunications system and
its networked equipment must be the primary concern of
an organization.
This section provides information about toll
fraud, service theft, and how to use the system administration
tools to minimize the possibility of such unauthorized activities.
Topics in this section include:
Toll fraud
Toll fraud is an expensive corporate crime that poses
a major threat to telecommunications systems. Toll frauds can include the following costs:
-
Expensive telephone charges
-
Revenue loss because of its operational impact, additional expenses, and service interruptions
-
Loss of customer confidence
Toll fraud overview
Toll fraud and long distance abuse are the unauthorized use of the company long-distance
services. It occurs when
people misdirect their own telecommunications charges to another
person or business. An unauthorized party can be a person who is not
a corporate employee, an agent, or a subcontractor.
When toll fraud occurs
Toll fraud is possible when an incoming caller can make a network connection with another person. Once the outside line is obtained, hackers can make calls to anywhere in the world. Toll fees are charged to the owner of the private branch exchange (PBX). Protect vulnerable areas such as call transfer and
bridging to an outbound call.
The following uses are only several in which unauthorized
users can attempt to breach your system security:
-
Unauthorized system use. Intruders use
your system to create a mailbox and use the system. Hackers
use personal computers, random number generators, and password
cracking programs to break into customer premises equipment-based
systems. Hackers continuously dial into the PBX or telephone
equipment and probe the system for a weakness that provides
access to an outside line. Once a hacker obtains an outside line, he or she can make
long distance calls.
-
Unauthorized mailbox use. An intruder discovers
how to use a particular mailbox, perhaps by:
Finding the password on a subscriber desk or in a wallet
Trying all the common variations of passwords
Buying the password from a computer hacker who breached the
system security and logged in as an administrator
- Fraudulent call transfer. An intruder uses
the transfer-to-extension feature by transferring to the first
few digits of a trunk access code.
Warning!
Toll fraud is a theft of long-distance service. When
toll fraud occurs, your organization is responsible for the
charges incurred. For more information about how to prevent toll fraud, call the Avaya Customer Care Center at 1-800-643-2352 and Avaya Support at 1-800-242- 2121.
Types of PBX-based toll fraud
Telecommunications service is highly important for an organization.
To make your system secure against toll fraud, address the following concerns:
Maintenance ports
Maintenance ports help the support vendor keep a product
operating. For traditional voice communications systems,
maintenance services comprise a robust set of support functions,
including:
- Remote monitoring, diagnostics, and trouble resolution
- Parts replacement
- Onsite corrective and preventative repair
- Telephone and online technical assistance
You cannot use maintenance ports to place telephone calls. However, hackers
can gain control over the system setup. Through maintenance ports,
hackers create security “holes” that permit unauthorized
calling. Hackers use devices that randomly
dial numbers until a modem or dial tone is obtained. Hackers then
hack the user ID and password to enter your system. Select
a good password with a combination of alphanumeric and special
characters. A good password decreases the chances
of password hacking.
On Modular Messaging systems with Avaya Message Storage Server (MSS), you can also use the Remote Maintenance Board (RMB) feature.
The RMB starts alarms and alerts. These alarms and alerts record
and notify the system administrator about unexpected and unpleasant
behavior in Avaya MSS. For information about how to connect the RMB, see "Connecting
the MSS RMB" in the Installation and Upgrades guide (pdf).
The Access Security Gateway (ASG) usually protects the maintenance port through a challenge and response algorithm. The most dangerous type of abuse is abuse of the maintenance port. Once the hackers enter your system, they have complete
control over all the administrative commands.
Voice mail fraud
Modular Messaging is a voice mail system. Voice mail is
a computerized voice messaging system and is more than an answering machine. You can use voice mail to listen to and send
messages from any tone dial telephone in the world. Voice mail reduces
the number of telephone calls, callbacks, and holding time. Voice mail is available
24 hours a day.
Two types of voice mail fraud are dependent on the type of PBX used. Both types of voice mail fraud give
the hacker access to proprietary corporate information.
The first type is responsible for most of the equipment-related toll fraud loss. Toll fraud can occur when hackers misuse the call transfer capabilities of voice mail
systems. Hackers can dial a Trunk
Access Code (TAC), Feature Access Code, Facility Access Code (FAC),
or an extension number. Hackers
can make fraudulent long-distance calls or request a company employee
to transfer them to a long-distance number.
The second type of voice mail fraud can occur when hackers use
a mailbox. Hackers either control the mailbox or use the information
stored within the mailbox. A hacker usually hacks the
voice mail password to change the password and greeting.
To prevent these types of voice mail fraud, you can configure the system in the following ways:
For more information, see the VMSC online Help topic "Outcalling restrictions and Receptionist tab."
Automated attendant
An automated attendant is the industry term for an electronic receptionist. Automated attendant is a service that connects to the PBX system. An automated attendant helps route calls to the appropriate extensions. Callers can select a defined destination from a menu of options. The destination can be a department,
announcement, or an attendant. A destination can also be a user-defined destination, such
as an extension number. An example of automated attendant devices is the
Modular Messaging system. Automated attendants connect to one or more ports on the PBX. The automated attendants
provide the necessary signaling to the PBX when a call is being
transferred.
Automated attendants include the following features:
- Screening your calls
- Extended absence greeting
- Blocking all incoming calls
- Caller applications
For more information about the Avaya Automated Attendant features, see the Telephone User Interface Guide (pdf).
Modular Messaging supports Teletypewriter (TTY) messaging in the US English. Administrators set up TTY support as an additional language,
US English (United States) - TTY. You can install US English (United States) - TTY in
the same way as other languages. You can set up TTY in Modular Messaging using the following ways:
- View VMSC as a valid
voice mail domain (VMD) language.
- Select TTY as a preferred telephone user interface (TUI)
language by any Modular Messaging local subscriber.
- Associate TTY with a key at the Automated Attendant main
prompt that callers can select.
For more information, see Messaging with a teletypewriter (TTY).
In general, many automated attendant systems are vulnerable to toll fraud and
are easy targets for toll hackers. When hackers connect to an automated
attendant system, they try to find a menu option that leads to an outside facility. Hackers can also enter a portion of the toll number to verify whether the automated attendant system passes the digits
directly to the PBX.
Many
voice messaging systems incorporate automated attendant features.
You can tighten the security
of the automated attendant itself. However, you must take additional steps
on the VMSC and the PBX side to reduce the risk of toll fraud. For more information about how to tighten the VMSC, see Voice mail fraud.
Before you set up an Automated Attendant, ensure that you do the following
to minimize unauthorized use:
-
Never allow a menu option to transfer to an outgoing trunk
without a specific destination.
-
When a digit from 1 through 9 is not a menu option, program the digit
to perform one of the following actions:
-
When 8 or 9 is dialed to access an outgoing line, program 8 or 9 on the Automated Attendant tab to take one of the following actions:
-
Restrict call transfers to subscribers when Basic Call Transfer
is used.
- Use the Outcalling Restrictions feature to prohibit users from obtaining
an external line when they dial an initial digit of an invalid
mailbox number. For more information about Outcalling Restrictions, see the Messaging Application Server
Administration Guide (pdf).
Remote access
Remote access is also referred to as Direct Inward System Access (DISA). With DISA,
callers can enter the system from public networks. Callers
can use the following methods to dial in to the system and use the system features and services:
After accessing the Modular Messaging system, the user hears a system dial tone. For system security, the system might require users to dial a barrier code. If a valid barrier code is dialed, the user hears
a dial tone and can place calls the same way as an on-premises
user.
Modular Messaging and toll fraud
This section discusses two Modular Messaging features that hackers can use to commit toll fraud. The section also provides information about how you can implement security checks.
Call Me
This feature calls subscribers at
a designated telephone number or a telephone list when subscribers
receive a message that meets certain specified criteria. Subscribers
who can use the feature create condition rules
that can trigger Call Me and call the telephone numbers.
Find Me
This feature redirects unanswered calls to a list of
telephone numbers specified by the subscriber. Find Me is implemented
for only those calls that are unanswered. However, the Find Me feature redirects a call to the messaging system when the subscriber telephone is busy. As a result, the caller cannot locate the called subscriber.
What you need to do
When a message triggers Call Me or Find Me, the Avaya Messaging Application Sever (MAS) calls telephone numbers on a subscriber-specified list. If no one answers at the first number in the list,
the MAS calls the next number until the call is answered. Because the MAS
makes calls to designated telephone numbers, the Call Me and Find Me features are
vulnerable to toll fraud. A Class of Service (COS) setting enables these features.
Avaya recommends that administrators
enable these features by relevant COS for only the subscribers
that require this method of notification. Administrators can
also assign a restrictive PBX COS to the PBX ports used to make
the outbound call, or require account codes or authorization codes.
Review your use of outbound calls to ensure that your subscribers establish proper rules for the Call Me and Find Me features. The rules should not waste telephone resources.
Detecting toll fraud
To detect possible hacker activity, users, and administrators can
look for the following situations:
-
Employees cannot get outside lines.
-
Customers have difficulties connecting to your toll-free
number. The busy line can impact local Direct Inward
Dial (DID) lines.
-
Users cannot explain an increase in long-distance usage.
-
System reports an increase in short duration calls.
-
Administrators notice a significant increase in internal requests for assistance in
making outbound calls, particularly international ones.
-
The system experiences heavy call volume during the night-time and weekend hours.
-
The system receives a sudden increase in wrong numbers.
-
Bills show calls made to unfamiliar or atypical numbers.
-
Attendants report frequent "no one there" or "sorry,
wrong number" calls.
-
Switchboard operators complain of frequent hang-ups or touchtone
sounds when they answer.
-
Sudden or unexplained inability to use specific administrative
functions within the system.
-
Staff or customer complaints of inability to enter the voice
mail system.
-
Simultaneous DISA authorization
code use coming from two different places at the same time.
-
Unusual increase in the use of customer premises equipment-based
system memory.
- Unusual increase in the number of subscribers with locked mailboxes.
-
Unexplained changes in system software parameters.
You can use monitoring techniques to review and track various
activities on your system. Modular Messaging provides a Reporting
tool. The tool generates comprehensive reports on the following types of information:
You can view each report for an entire day or for each hour. Review these reports
on a regular basis to help establish traffic trends. Use the reporting and monitoring tools to monitor
your system on a regular basis. If you notice any suspicious or
unusual patterns, take corrective action.
In addition, you can use the following measures to reduce the possibilities
of frauds:
-
Restrict call transfers to the host PBX when the system does not allow transfers, uses Enhanced Call Transfer, or permits Transfer to
Subscriber Only.
-
When password protection into voice mailboxes is offered, use
at least the minimum length specified for passwords.
-
Deactivate unassigned mailboxes, and remove unused mailboxes.
-
Lock out consecutive unsuccessful attempts to enter a voice
mailbox. Administrators configure the number of unsuccessful attempts.
-
Establish your password as soon as your voice mail system extension
is assigned. A new password ensures that only you have access to your
mailbox.
-
Assign passwords or configure the system in such a way that requires each subscriber to change his or her initial password immediately.
-
Record and store the administrative password in a secure
place, preferably off site. Never discard an active password.
-
Never program passwords on auto-dial buttons.
-
Contact Avaya for additional measures that you can take to
prevent fraud.
Unauthorized system use
To minimize the risk of unauthorized break-ins to the system,
use the compliance guidelines for the following passwords:
Use the password aging feature.
Modular Messaging comes with administrative password features and
options. The following options help you secure your system:
-
Change default passwords. When
you first use your system, change the
system administrator log-in and the voice mail administrator log-in
passwords immediately. The logins provide access to the MSS. The Windows Terminal Services into the MAS restricts the MAS access to Windows access control
lists (ACLs). Configure passwords to require that subscribers change their log-in passwords immediately.
Password standards. Follow the minimum password standards to comply with the system
standards for administrator and subscriber passwords.
Depending on your Modular Messaging with Exchange or Domino setup, you can configure a mailbox that does not require a log-in password. A disabled password impacts security. Increase the number of alphanumeric characters in a password to lower the probability that an unauthorized user can gain access. For more information, see Messaging Application Server Administration Guide
for Avaya Modular Messaging with the Avaya MAS and Avaya MSS.
- Password aging. Use the password
aging feature parameters to enhance the security levels of the
system. This ensures that administration and subscriber passwords are changed
at regular intervals. You can also use the password expiration
feature for administrative and subscriber logins to reduce the danger of unauthorized
access.
For more information about passwords and mailbox administration, see Password and mailbox administration.
You can ensure additional security by using the ASG to provide secure remote access
to the MSS. For more information about ASG, see Adjuncts.
Top of page
|