top of page

PABX Fraud Frequently Asked Questions

Below is some of the most common questions asked in relation to PABX fraud. PABX fraud is one disaster that is very predictable and easily preventable. Contact your phone support team and ask them to ensure that your system is secure and that they fully understand all the areas that can be hacked. Often one of then is missed. If you are not sure contact your IOLS consultant.

01

When I get hacked, who is going to pay for the calls?
Your company is responsible for all charges incurred on your system. Recent court decisions and filed tariffs make you, not the carrier, responsible for the security of your CBX/PCX system if you have not taken steps to protect your assets.

02

Who are these people and why are they stealing calls?

Today, communication theft is perpetrated from remote distances by highly skilled, technologically sophisticated criminals who have little fear of being detected, let alone apprehended or prosecuted. These criminals conduct a growing business selling access to communications systems all over the country.

03

Why don't the carriers write off these charges?

Today, fraudulent calls are placed over many different inter-exchange Carriers (IXC), each carrier must pay that portion of the call handled by them. When the call is placed to an international location the domestic carrier must pay the foreign carrier regardless of the fraud. Court cases divestiture and FCC rulings prevent carriers from writing off calls. You the end user control access to your systems.

04

05

Why is identifying or stopping the fraudulent calls the customer's responsibility?

Only the customer can differentiate legitimate calls from fraudulent ones. The long distance carriers do not have access or permission to work on your CBX / PBX, the vehicle that hackers use most to conduct their activities.

How does a hacker gain access to my system?

Hackers use computerized calling programs, automatic diallers, and sophisticated software to break your systems security and pass codes. Hackers attempt to gain access in the following order:

1) Phone Mail / Voice Mail

2) Automated Attendant

3) Remote Access or Direct Inward Service Access (DSIA)

4) Remote Maintenance/ Administration Port.

bottom of page