Sponsored By

The Threat of Toll Fraud PersistsThe Threat of Toll Fraud Persists

With a toll fraud prevention and mitigation strategy, enterprises can identify and mitigate potential toll threats – sometimes before they even happen.

Irwin Lazar

September 15, 2019

3 Min Read
Cellular phones and network

As No Jitter contributor Joyce Osenbaugh noted earlier this year, telecom fraud is on the rise. The Communications Fraud Control Association (CFCA)’s annual survey of telecom fraud noted 2018 losses amounted to around $28 billion. While that’s down a bit over the last few years, bad actors can still attack enterprise phone systems by fraudulent means.

 

Cost of Toll Frauds

Toll fraud attacks happen in a variety of ways. In most instances, attacks take the form of International Revenue Share Fraud (IRSF), an approach where attackers exploit a compromised VoIP server to generate large numbers of calls to high calling rate markets. Attackers make their money often by setting up fraudulent companies, or in conjunction with rogue telecom operators. The 2017 CFCA survey noted that of the $29.2 billion in losses that year, $6.10 billion was due to IRSF attacks.

 

Other forms of fraud include attacks to high-cost 8xx numbers or SIM box attacks that seek to evade telco interconnects to avoid paying tariffs. In addition to these commonplace attacks, many phone calls are simply spam or fraudulent attempts to get unsuspecting receivers to part with their money through several illicit schemes.

 

Unfortunately, most enterprise telecom leaders still pay little attention to security. As I noted in a No Jitter post this past July, 21.3% of the 645 organizations participating in our Workplace Collaboration: 2019-20 Research Study have a pro-active security strategy. Of those with a strategy, most include audits, penetration testing, and regular patching as key components of their security approach. Only 25% believe that adopting SIP trunking creates an additional security risk.

 

As entry points into phone systems increase – thanks to the growing use of softphones, mobile clients, APIs, and WebRTC that embed calling into just about any app – so to do the potential vectors for attack. However, a recent Ribbon Communications UC Market Insights study found that 85% of respondents believe that their UC provider should protect them, just 15% believe they’re responsible for protecting themselves against an attack.

 

Building A Toll Fraud Strategy

As the risk of attacks grows, along with awareness of past successful attacks, so too should enterprise awareness of the need to proactively protect their WC applications, even if using cloud-based services. Fortunately, enterprises have tools that can leverage analytics to understand calling patterns, look for known attack signatures or anomalies that could indicate zero-day attacks, and automate the process of blocking an attack or mitigating the impacts of one that has occurred. Ideally, a solution would enable rapid detection, anticipate an attack with predictive analysis, and automate means of responding to or preventing the attack. With more than 60% of organizations running more than one calling system, a toll fraud prevention platform would ideally enable unified management across a multi-vendor calling environment.

 

A toll fraud prevention and mitigation strategy starts with recognizing the problem, in this case, the risk to reputation and the costs of a successful toll fraud attack. IT leaders must take a proactive approach to first understand their risks, and second to implement a security strategy that includes regular audits, patching, penetration testing, and the capability to leverage analytics to improve the ability to recognize, contain, and respond to attacks as they occur, or to prevent them from occurring in the first place.

 

Join No Jitter, Ribbon Communications, and Nemertes Research on September 18 at 2 PM EDT for an in-depth webinar, titled “Conquering Toll Fraud with Analytics,” on the subject.

About the Author

Irwin Lazar

As president and principal analyst at Metrigy, Irwin Lazar develops and manages research projects, conducts and analyzes primary research, and advises enterprise and vendor clients on technology strategy, adoption and business metrics, Mr. Lazar is responsible for benchmarking the adoption and use of emerging technologies in the digital workplace, covering enterprise communications and collaboration as an industry analyst for over 20 years.

 

A Certified Information Systems Security Professional (CISSP) and sought-after speaker and author, Mr. Lazar is a blogger for NoJitter.com and contributor for SearchUnifiedCommunications.com writing on topics including team collaboration, UC, cloud, adoption, SD-WAN, CPaaS, WebRTC, and more. He is a frequent resource for the business and trade press and is a regular speaker at events such as Enterprise Connect, InfoComm, and FutureIT. In 2017 he was recognized as an Emerging Technologies Fellow by the IMCCA and InfoComm.

 

Mr. Lazar’s earlier background was in IP network and security architecture, design, and operations where he advised global organizations and held direct operational responsibility for worldwide voice and data networks.

 

Mr. Lazar holds an MBA from George Mason University and a Bachelor of Business Administration in Management Information Systems from Radford University where he received a commission as a Second Lieutenant in the U.S. Army Reserve, Ordnance Corps. He is a Certified Information Systems Security Professional (CISSP). Outside of Metrigy, Mr. Lazar has been active in Scouting for over ten years as a Scouting leader with Troop 1882 in Haymarket VA.