IP-based communications opened a world of opportunities and also a world of threats. Below are eight major VoIP threats of which you should be aware.
Also known as VoIP Phishing, vishing is a form of fraudulent calling similar to email phishing. Scammers pretend to call from a trusted source, like the bank or more recently the IRS. The visher earns the caller’s trust and requests confidential information, like a social security or account number, and gains access to bank accounts or opens lines of credit. Here’s how you can protect yourself from fraud calling.
- ID Spoofing
In the past, spoofing required advanced knowledge of telephone equipment that was expensive to acquire. We're talking in the thousands of dollars. Today, open source software has made spoofing much easier to accomplish. The spoofer can hack the telephone network to change the Caller ID of where the call is originating from to be any number or name they want.
- VOIP Toll Fraud
Think you’re unsusceptible to toll fraud? Leave a port open on your network and see how long it takes to get exploited. When a port is left open, hackers can register extensions on your network and rack up charges that you’ll be responsible for. It’s important for your network to have strong pass codes and monitoring processes so that you’re able to act quickly and shut down the hacker.
- DDoS Attacks
DDoS are distributed denial of service attacks. The goal of the attacker is to disrupt, or even worse, bring down your network. In some cases, they may use an attack as coercion for something in return to stop the attack. They’ll hit your network with requests in the 1000s per second until there’s no choice but to close the network down. Without strong VoIP security, your network is vulnerable. DDoS attacks can bring your business to a screeching halt, which is obviously damaging to your day-to-day operations.
Did you know that if you’re using softphones and software you’re vulnerable? As long as you’re connected to the Internet, you’re susceptible to worms, Trojan horses and all of the other nasty viruses that are circulating the web. Make sure your network is behind a strong firewall and that your virus software is always running and up to date.
Scammers are spoofing phone numbers and deceiving emergency service operators into sending police, fire, and in extreme cases SWAT teams to another person’s address. The culprit will mislead the operator to believe that a reprehensible crime is being committed at another person’s address. This leads to a waste of resources and is becoming an issue since no call records can be tracked.
VoIP systems are still susceptible to eavesdropping. If you leave your system vulnerable without some sort of encryption or firewall, your conversations could have multiple people on the line without you even knowing. Eavesdropping can lead to sharing of confidential data that can be used for nefarious purposes, such as identity theft or fraud.
- Call Hijacking
Hijacking and eavesdropping appear similar but are actually different. Hijacking involves re-routing the call to a different party entirely, rather than listening in on the call. At that point, the person on the other end pretends to be the originating call. But, how? This may make your head spin, but they can alter the VoIP registrar’s records to replace the actual record with the IP-address of the hijacker.
Remain vigilant against these threats and have network monitors in place that are able to point out and stop these threats. If you're looking for for a new VoIP solutions provider that's able to future-proof your business, while helping you maintain a secure network, contact us today and let's start the conversation on how we can help you.