We are all concerned with piracy.

At CFAST, we hired network security experts. It has become a key position in companies dealing with large data volumetries. But often, piracy happens through negligence. We know that there is still a long way to go before everyone is sensitized and change their low security passwords (0000, 1234 ...) for complex (0072017555?) and different one on each technology or service requiring an access code.

Businesses and individuals are less aware of phone piracy. This piracy is the nightmare of operators because it can have disastrous consequences on the finances of their customers. Indeed, although fraudulent, these consumptions are nonetheless real and must be paid by the end customer for amounts often exorbitant.

Three holes are exploited by hackers:
Today, the new generation of standards is fully integrated into the company's network. The hackers enter the company's network and use the various facilities set up as a gateway to international calls or value-added numbers

These virtual delinquents can also be introduced into the employees' voice messaging. For lack of awareness, end users do not customize or set a password to access them. It is technically possible for hackers to trigger calls to different types of premium or surcharged numbers.

Hackers also know how to hack the administrator interface. The pirate returns to the telephone switch whose access is not complex enough. It can then degrade the company's telephony, undermine all integration or even generate paid calls.

We, therefore, see that there are major risks to the safety of the company. Whether security is internalized or outsourced, whether there are one or ten experts, do not forget that even governments are facing challenges facing cybercrime.

In this framework of prevention of fraud and intrusions, CFAST has set up for the operators a system of detection based on CDR anomalies. The user operator of CFAST will define an alert threshold of 50 € for example. After downloading and qualification of the destinations of the file calls, an analysis is carried out in order to compare the purchase amount for a telephone number to a destination in the file with respect to the detection threshold set on the account. CDR files are made available by vendor operators. CFAST reviews all accounts every hour to download and analyze them.

If the alert threshold is reached, CFAST sends an email to users who subscribe to fault detection notifications. For security, this mail is duplicated of a notification in their interface CFAST.

The operator is then alerted to the anomaly and can call his client in order to investigate. If there is cause for concern, he may ask him to cut his facilities and thus limit the financial damage caused by piracy.

This feature has been developed to protect your customers and avoid irreparable harm. Published on 04/05/2017