EGISTECH

VoIP Security for Business

We Are The Best Partner.
We Provide The Best VoIP Security Solutions for Business.

VoIP Threats

In the early days of VoIP, there was no big concern about security issues related to its use. People were mostly concerned with its cost, functionality and reliability. Now that VoIP has gained wide acceptance and become one of the mainstream communication technologies, but security will become a major issue.
The security threats cause even more concern when we think that VoIP is in fact replacing the oldest and most secure communication system the world ever known – POTS (Plain Old Telephone System).

Denial of Service Attacks

DoS attacks can be carried out by flooding a target with unnecessary SIP call-signaling messages like Register message or Option Message, by using Well known hacking tools, Massive Register message can affect the performance of SIP Sever. If SIP server should process Register messages over its max performance all at once, it would drop calls or halt call-processing.

Denial of Service Attacks

International Revenue Sharing Fraud

Toll Fraud Call, It is the most serious attack. Toll fraud ranges from minor abuse by employees to organized toll fraud by hackers to make money. International revenue sharing fraud is the most damaging and the most common scenario. As you know, it abuses carrier interconnect agreement. The hacker makes an agreement with a local carrier to share revenue for calls generated by he hacker.

International Revenue Sharing Fraud

SPAM

Every VoIP account has an associated IP address. It is easy for spammers to send their messages (voicemails) to thousands of IP addresses. Voicemailing as a result will suffer. With spamming, voicemails will be clogged and more space as well as better voicemail management tools will be required. Moreover, spam messages can carry viruses and spyware along with them. This brings us to another flavor of SPIT, which is phishing over VoIP.
Phishing attacks consist of sending a voicemail to a person, masquerading it with information from a party trustworthy to the receiver, like a bank or online paying service, making him think he is safe. The voicemail usually asks for confidential data like passwords or credit card numbers.

SPAM
CONTACT

CONTACT

  • Seoul, Korea
    • Tel_Icon+82 (0)2-6932-1630
    • E-mail_Iconsales@egistech.co.kr