riminals will pose as a representative of a large company (for example, Apple, Geico, or United Healthcare) calling in response to a question the victim supposedly has. But before they can proceed, the criminal must first "authenticate" the victim — verify a Social Security Number, a username and password, etc.
Sometimes, the criminal will even trick a victim into giving them remote access to their computer so the phony customer service rep can "fix" an issue.
When hackers infiltrate your voice system and call expensive overseas numbers, it adds up. That's because they're sharing revenue with the call destination: more traffic, more bogus fees.
Detecting International Revenue Sharing Fraud before bills pile up is critical.
Call traffic pumping or “access stimulation” is the computer-generation of calls into 1-800 toll free destinations in order to collect a portion of the connection or per-minute charges associated with the call.
If the fraudster’s goal is the collection of connection charges, then they will often “spray” numerous 1-800 numbers and then immediately disconnect after the call is established. However, some attack calls may attempt to run-up per minute charges by dwelling in a corporate Interactive Voice Response (IVR) System via silence or DTMF sequences.
Ready? Let's Talk.
Learn more about how SecureLogix can protect your voice network against malicious threats.