faa handbooks & manuals (1).pdf
TRANSCRIPT
-
8/9/2019 FAA Handbooks & Manuals (1).pdf
1/11
VOIP THEFT OF
SERVICE:
PROTECTING YOUR
NETWORK
======
-
8/9/2019 FAA Handbooks & Manuals (1).pdf
2/11
[1]
VoIP Theft of Service | White Paper
© TransNexus, Inc. 2013
Table of ContentsIntroduction to VoIP Theft of Serice .................................................................... 2
!eet "ur #x$ert % Phone Po&er .............................................................................................................. 2
The 'nato() of Internationa* +eenue Sharin -raud ......................................... 2
o((on Internationa* +eenue Sharin -raud Scenarios .................................... 3
Voice !ai* /acin ....................................................................................................................................
- uide*ines 'oidin Voice !ai* -raud ..........................................................................................
a** -or&ardin /ac ................................................................................................................................ 4
5uffer "erf*o& 'T' 'ttac ...................................................................................................................... 4
5*ind a** Transfers.................................................................................................................................... 6
7ho*esa*e Trunin .................................................................................................................................. 6
The -uture of VoIP Theft of Serice ....................................................................... 8
"n*ine 5*ac !arets The -ina* -rontier .............................................................................................. 8
Preentin VoIP Theft of Serice ........................................................................... 9
Secure :our Net&or ................................................................................................................................ 9
-raud ;etection Soft&are ......................................................................................................................... 9
Su((ar) ................................................................................................................ 9
'
-
8/9/2019 FAA Handbooks & Manuals (1).pdf
3/11
[2]
VoIP Theft of Service | White Paper
© TransNexus, Inc. 2013
Introduction to VoIP Theft of ServiceThe truth is )ou =ust aren>t a $hone co($an) unti*
)ou>e had a run?in &ith te*eco( fraud. VoIP fraud isa sinificant and ro&in $ro
-
8/9/2019 FAA Handbooks & Manuals (1).pdf
4/11
[3]
VoIP Theft of Service | White Paper
© TransNexus, Inc. 2013
FI+S- is the (ost co((on for( of fraud &e see,G said +)an ;e*rosso, T" of Phone Po&er. FThe
internationa* carrier that de*iers the *ast (i*e is o
-
8/9/2019 FAA Handbooks & Manuals (1).pdf
5/11
[]
VoIP Theft of Service | White Paper
© TransNexus, Inc. 2013
-o**o&in are three exa($*es that i**ustrate ho& fraud techniMues hae $roressed
fro( hacs oer the te*e$hone net&or usin dia* tones, to hacs of the &e<
interfaces of P5s to (ore so$histicated hacs of custo(er $re(ise eMui$(ent on
the Internet.
Voice Mail HackingVoice !ai* hacin &as an ear*) for( of co((unications fraud. It can ha$$en
si($*) and easi*) throuh the te*e$hone net&or. It is a $ro
-
8/9/2019 FAA Handbooks & Manuals (1).pdf
6/11
[4]
VoIP Theft of Service | White Paper
© TransNexus, Inc. 2013
Call Forwarding HackThe a** -or&ardin hac is a (ore so$histicated for( of VoIP fraud. In this case, fraudsters are hacin
throuh the user access &e< $orta* of an enter$rise P5. 5) uessin a user>s $ass&ord, the) can *ointo a P5, and confiure ca** for&ardin to an ex$ensie *on distance destination to $rofit fro( I+S-.
Then the hacer &i** ca** the te*e$hone nu(
-
8/9/2019 FAA Handbooks & Manuals (1).pdf
7/11
-
8/9/2019 FAA Handbooks & Manuals (1).pdf
8/11
[6]
VoIP Theft of Service | White Paper
© TransNexus, Inc. 2013
Blind Call Transfers5*ind ca** transfers are a so$histicated techniMue for dou
-
8/9/2019 FAA Handbooks & Manuals (1).pdf
9/11
[8]
VoIP Theft of Service | White Paper
© TransNexus, Inc. 2013
1.
/acer>s softs&itch reisters &ith serice $roider>s softs&itch usin
sto*en user na(e and $ass&ord
2.
a**in card user $*aces a ca**
3.
a**in card $roider routes ca** to *o&est adertised route ChacerD
.
/acer sends INVIT# to serice $roider>s softs&itch
4.
Softs&itch routes ca** to internationa* *on distance destination
;e*rosso ex$*ains that he has traced this t)$e of fraudu*ent traffic co(in fro(
$re$aid ca**in card co($anies o$eratin a VoIP $*atfor( in an offshoreco*ocation faci*it). Pre$aid ca**in serices are &e** suited to ex$*oit this t)$e of
fraud since there are no ca**in nu(
-
8/9/2019 FAA Handbooks & Manuals (1).pdf
10/11
[9]
VoIP Theft of Service | White Paper
© TransNexus, Inc. 2013
(an) cri(ina*s as $ossi
-
8/9/2019 FAA Handbooks & Manuals (1).pdf
11/11
[10]
VoIP Theft of Service | White Paper
© TransNexus, Inc. 2013
About TransNexusTransNexus is a soft&are dee*o$(ent co($an) s$ecia*iBin in a$$*ications for (anain &ho*esa*e
VoIP net&ors. TransNexus $roides its "$erations and 5i**in Su$$ort S)ste( C"SSO5SSD soft&are$*atfor( to (a=or VoIP carriers &or*d&ide. I($ortant carrier features offered