All fraud attempts start with hackers probing for specific types of account vulnerability, such as use of default passwords on known devices, no firewall filtering on SIP peering / trunking, unprotected access to port 80 et al. Once identified the hackers goal is to route calls via the compromised account to the world’s war torn despotic locales. Hackers have no interest in making local calls. Once the account has been compromised, they’ll sell access to the unsuspecting victim’s CPE to unscrupulous calling card operators or similar specialising in routes to the worlds hotspots. Hence it can be months before the hacker cashes in on the compromise.
The most basic thing you can do is a strong passwords, upper & lower caps, numerals and a wildcard like % or &. For example hAv3@nic3day is many times harder to crack and “haveaniceday”. Locking down your routers port 80 and for IT people always use implement firewall rules to limit access to your SIP Ports (5060, 5061, 50600) to your SIP service providers.
While we constantly monitor suspicious calling patterns, it is ultimately the customers responsibility to ensure the end user equipment is secure. We have no liability for financial loss caused by illegal access to customers phone equipment.
Edward Snowden on Passwords
How we block Fraud Attempts
When your CPE is compromised, the attacker connects what initially looks like legitimate calls through your equipment. While there are patterns to successful attacks, attacks are always well planned and mostly occur sometime after the initial compromise. On our side we have a number of strategies to mitigate fraud; blocking IP addressing from common hotspots, similarly blocking calls to high risk destination. Since Snowden we now know that governments and even vendors as their proxies are hacking. All before the myriad of specialist password cracking algorithms and probing tools.
What should you do to prevent?
Registration: The resolution from your side is usually as simple as changing or providing strong passwords. If your account has been blocked by us for a suspected fraud attempt, it is essential that your password is immediately changed out. SIP Peering: Administrators must limit all access to their WAN IP including most importantly SIP ports 5060 and port 80 to known service providers (such as us) and system admins.
What happens after we have blocked your account?
We will notify you by email of the international toll block on your account.
Immediately the account will have been prevented from making overseas calls. As soon as you have reset the password, or hardened your firewall, we will re-enable the account to allow overseas calling.
Occasionally staff will in error misdial the leading prefix, which our systems identify as potential threat (e.g. Somalia is +252). We are generally quick to identify misdialled prefixes and after speaking directly with account holders will quickly unblock the account. Most customers are happy to put up with this minor inconvenience for the comfort of knowing we are actively monitoring call fraud attempts.
Configuring an IP phone to our Business VoIP Service We support two mechanisms of connecting to our service, Registration and secondly SIP Peering. If connecting via Registration your handset or phone system requires a UserName (the phone number) and ...
Voicemail Service Your Accounts Voicemail puts you in control of setting up and accessing your messages from anywhere. Our standard voicemail features include personal recordings for BUSY and UNAVAILABLE, save, delete, forward and the ability to ...
Can I use my existing phone with your service? If you have a VoIP (or IP) handset you will be able to use this device. If your existing handset is not, you will not be able to use this device. We can provide device provisioning within your account ...
TCP, TLS and Secure RTP Options We support both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) communication protocols. While UDP is by far the most common of the two protocols TCP is stated to have advantages. TCP advantages ...