PBX Fraud – Fast catching up as the mother of all frauds.

According to the 2011 Global Fraud Loss Survey conducted by Communications Fraud Control Association (CFCA), the top two fraud types in the Telecommunication industry are Subscription Fraud and Compromised PBX System Fraud (circa $10 billion in combined dollar loss). While PBX fraud has been around for many years it has only taken centre stage as businesses and service providers begin to feel the pinch.

Subscription fraud is perhaps the mother of all frauds, targeting operators indiscriminately, but PBX fraud is fast catching up. Unlike subscription fraud however, PBX system fraud is not perpetrated by petty criminals in possession of false identities. It is actually committed by technologically sophisticated criminals or criminal groups in collusion with insiders and vendors who hack into an organisation’s PBX system for massive personal gain. These criminals seldom care being detected, let alone prosecuted, and are coming up with innovative techniques to exploit the vulnerabilities in these systems.

PBX systems open up a number of vulnerabilities that let hackers take advantage. For instance, unchanged administrator or system passwords from factory settings, week voicemail passwords, poorly configured controls etc can easily be wrecked with a bit of perseverance and technical know-how. Once unauthorised access is gained into the PBX system, the fraudster can place local or international calls at your expense, sell calls to other criminals and rack up huge expenses in just a few hours. Well, if you read the fine print carefully, the career or the service provider makes it clear that you will be responsible for the expenses in case the PBX system has been compromised.

Gaining access to the administrative ports of the system, the fraudster gains total control and can do a myriad of things to bring your organisation to its knees. Imagine if all your extensions are deleted, your voicemails hacked, personal greetings changed and racked hundreds of thousands of dollars in calls; imagine if this can be perpetrated across all your branch offices and the money cannot be easily recovered or perpetrators traced; it’s sure to send shivers down your spine, in particular if you are a small business.

A number of steps can be taken to protect the PBX system. For example, setting complex passwords for the administrative ports, rotating the passwords periodically, removing factory set passwords, removing test or inactive mailboxes, asking users to maintain strong PINs to gain access to their voicemails, restricting international calls, restricting international destinations and setting a realistic credit limit with the service provider are just a few ways to protect your system from damages.

With an IP based PBX you can also collect call detail records and check for anomalies in real time to reduce the impact of fraud even if the PBX is compromised. A number of these preventive steps don’t cost a lot and can be done with little help from the manufacturers and service providers.

PBX fraud can have debilitating effects, in particular if you are a small business, but at the same time they are equally preventable. A strong security policy, sound PBX controls and configuration, user education and continuous system monitoring is strongly recommended to curtail this menace.

You Might Also Like
Battle tested technology.
Use it just the way you want it.

Whether you are just starting out or you are miles ahead and want to optimise your customer experience, you can use our technology just the way you imagine it. In multiple ways for multiple use cases.

Native Mobile SDKs

Offline Android and iOS components for identity capture. Works without internet connection. Quick integration into your native Apps. Tested in over 1000+ mobile devices.

View SDK Documentation video kyc
Cloud APIs

Restful APIs that can be integrated instantly without worrying about infrastructure or auto scaling. Our battle tested AWS environment is ISO 27001:2013 certified and monitored 24x7.

View API Documentation video kyc

Use our technology deployed as Docker containers in your own servers. In this set up there are no external calls outside your servers giving you total control over your data.

Contact Sales video kyc
Cloud Dashboard (no-code)

Get started instantly and begin your identity verification projects. The dashboard provides you with everything you need to onboard your customers as per prevailing regulations.

Book a demo video kyc

Trusted technology platform.

Trust is hard to earn. We certainly do not earn them through paid advertising. Instead, we earn your trust by providing a high-quality product and reliable service that you can count on. Every single day.

Award winning technology
Patent pending technologies matured over ten years with proven accuracy, quality and scale.
Support that truly supports
Whatever it takes, we are here to help you succeed with our tools and services.
Secure enterprise platform
Use our cloud platform to get started now. Or deploy this within your own premises.
Pricing that makes sense
Pay per transaction with discounts as you scale. Or annual subscription with unlimited usage.

Trusted by 150+ customers worldwide

Book a free demo

Built for flexibility, compliance and reliability to serve multiple industry segments.

Gig Economy