Editorial

Expensive Fraud Calls

Published on:

October 20, 2014

The recent case of phone call fraud highlights the growing risk of PBX systems being compromised, with hackers using them to dial expensive numbers. This situation often arises when the PBX is used as a "least cost router" to route calls through expensive destinations. Even without external voice traffic, however, bots on local networks can exploit PBX systems by accessing the TAPI feature and dialing numbers directly from a computer. To mitigate risks, it's crucial to ensure strong security measures, like checking for viruses, using secure passwords, and verifying the fraud detection features offered by service providers. It's also important to restrict expensive number calls via the PBX dial plan and ensure TAPI licenses are carefully managed.

It happened again, and it won't be the last time: http://finance.yahoo.com/news/phone-hackers-dial-redial-steal-012343295.html. Another victim of phone call fraud, the result of a hacked PBX somehow accessible to the bad guys.

We have talked about it before, but reading the article I think it's important to discuss some points that weren't so clear before. The first one is some carriers really seem to go after the money, even if they have to go to court. In contrast with the credit card industry, fraud calls are the responsibility of the customer, not the provider.

The next point is it's obviously not necessary the PBX actually receives voice traffic from the public internet - fraud calls typically fraud uses the victim's PBX as a kind of “least cost router” for terminating traffic into expensive countries. But when calling expensive 900 numbers, like those mentioned in the article, there's no need to have any traffic with the outside world. All it takes is the PBX using its route into the PSTN world.

In theory, a bot on a computer in the LAN can use the click-to-dial feature of the PBX to keep on dialing expensive numbers. The voice would end up somewhere either on the local PC or smart phone, or just on the phone on the office table. On the weekend, when nobody is in the office, it would take some time to figure out what's going on.

This is new. If a bot can access the local TAPI on the computer and initiate a call, you're in trouble. There's no extra password check between the TAPI client and the TAPI server. All it takes is a program running on the local PC that starts to dial numbers.

So what are we learning from all of this?

Apart from the usual recommendations to check for viruses on your computer and make sure users are choosing strong passwords and PIN codes, you should check if your service provider has a fraud detection feature. This will limit the damage, in case you get hacked for whatever reason, despite all the precautions you took. If you are using prepaid accounts, the damage will be limited to the money you've put into the meter.

By default, version 5 doesn't come with a CSTA license, which is required for TAPI calls. If you have the license and are using TAPI, you can take a few measures that reduce exposure to the risk - you can double check what numbers can be called from your PBX in the dial plan. In many cases, it's not necessary that PBX users are dialing expensive hotlines; if they do, you can set the flag in the dial plan so they have to enter a PIN code. And you can make sure PCs are turned off when users aren't in the office. This makes sure you don’t have any surprises on your phone bill on Monday morning. It also saves power.

Latest Articles

View All

Smarter Hotel Communication: Vodia PBX Now Integrates with Shiji PMS

Vodia now offers seamless integration with the Shiji Property Management System (PMS), empowering hotels to streamline operations, automate routine tasks, and enhance guest experiences through smarter communication. From check-in to check-out, the integration connects telephony with front desk functions—enabling features like personalized extension setup, automated call billing, room status updates via maid codes, and effortless room changes. With a secure real-time interface, no complex middleware, and support for cloud, on-prem, or hybrid deployments, the Vodia-Shiji solution is built for reliability, scalability, and modern hospitality.

May 23, 2025

The Vodia - Microsoft Teams Integration Tool

The Vodia-Teams NPM Integration Tool makes it easy for enterprises and SMBs to connect Vodia PBX with Microsoft Teams, enabling secure, seamless voice communication within Teams. Certified by Microsoft for direct routing, this tool automates extension mapping and phone number assignments across multi-tenant Microsoft 365 environments, allowing users to make and receive calls through the PBX via Teams. This integration opens new possibilities in industries like hospitality, healthcare, and education by unifying voice services, supporting door phones, paging, and flexible call routing — all managed centrally for simplicity and scalability.

May 20, 2025

Monitoring Your Vodia PBX: Ensuring Continuous Communication

The Vodia PBX comes equipped with powerful built-in monitoring tools and integration options to ensure seamless, uninterrupted communication. From real-time system graphs and syslog analysis to packet capture tracking and detailed CDRs, Vodia enables proactive issue detection, performance optimization, and enhanced call quality. With support for SNMP, Prometheus, and external services like Pingdom and Site24x7, you can monitor everything from registration anomalies to system resource usage and SIP connectivity across multiple servers—all in one comprehensive solution.

May 15, 2025