My VOIP provider has made me aware that we have been victims of a voicemail hack which I believe is known as DISA toll fraud. Our voicemail system was perpetrated for the purpose of placing long distance calls at the expense of our company. The malicious user(s) took advantage of a weak PIN/password in voicemail.
The malicious user racked up a large 5 digit number in charges to the Caribbean Island. All these calls took place over a 5-day period. Our VOIP provider is telling us the international call activity did not generate any alarms at the time. They are saying the user(s) were able to disguise the activity from them seeing the source calls. I guess the Caribbean Islands utilize US style area codes and are often overlooked.
The voicemail is a Cisco Unity system. The VOIP provider provides the infrastructure and support for the VOIP phone system. They are saying they are not responsible for the maintenance of user logins and PINs within the Cisco Unity system along with the pass-through dialing option within the Cisco Unity system.
They ended up resolving this by applying and forcing a stronger voicemail PIN policy at our expense. I have a call with the VOIP provider tomorrow with their services team to discuss the charges and the events in more detail. Ok, the voicemail PINs were weak which caused the toll fraud. However, we are not managing the phone system infrastructure and we don’t manage the alerts. I don’t feel like my VOIP provider protected us from the large long distance bills and I’m trying to understand how they are able to put the long distance bill on us. I would love to hear the reactions and comments regarding this from the MangoLassi users before I’m on the call tomorrow.