ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    VOIP voicemail hacked aka DISA toll fraud

    IT Discussion
    10
    43
    2.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JaredBuschJ
      JaredBusch
      last edited by

      By default it does not work unless someone goes into this hard to find setting and populates it.

      If you dial into my voicemail with my password and hit option 3 for advanced options, the only valid choice is option 5 to leave a message for another extension. There is no way to break out of it. Hitting option 4 kicks it back to the initial mailbox menu.

      0_1542293151001_2dfdc20c-8be4-4cc9-ad2c-bfc2a267fb30-image.png

      scottalanmillerS 1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller @JaredBusch
        last edited by

        @JaredBusch that's what I thought. As I look at our systems, none seem to have any susceptibility to this kind of attack. Maybe Cisco doesn't out of the box and someone enabled this ridiculousness? That seems unlikely, but who knows.

        1 Reply Last reply Reply Quote 2
        • FATeknollogeeF
          FATeknollogee
          last edited by FATeknollogee

          For me, I do auto funding but only in the range of $50-80 per hit.
          This way I get alerts on my iPhone from my c/c every time a VOIP replenish charge goes through.

          I also have International calls disabled.

          1 Reply Last reply Reply Quote 0
          • 1
          • 2
          • 3
          • 3 / 3
          • First post
            Last post