<div dir="ltr">The PBX was hacked, originating calls to expensive int'l destination - presumably, a case of revenue share fraud. Have you considered smart tools that monitor revenue share fraud accurately? Some of them can flag fraud by identifying unusual calling patterns - in near real-time.<div>
<br></div><div>It's like the credit card industry that shuts down the credit if it suspects unusual purchases.</div><div><br></div><div>Hope that helps.</div><div><br></div><div> </div></div><div class="gmail_extra"><br>
<br><div class="gmail_quote">On Wed, Feb 19, 2014 at 5:09 PM, John Curry <span dir="ltr"><<a href="mailto:John@intelechoice.us" target="_blank">John@intelechoice.us</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div lang="EN-US" link="blue" vlink="purple"><div><p class="MsoNormal">I am new to your site. I was looking in the Archives and saw in November 2013 there were some of you who experienced fraud. We had a an Avaya IP Office customers system who got hit pretty bad. The customer is treating the fraudulent calls like credit card fraud and not taking any responsibility. Does anyone have any advice on how to persuade the customer take this issue seriously? His bill was racked up pretty good. Strangely and coincidentally Avaya came out with a security bulletin the end of December 2013 on this same issue. I tried to contact Avaya with no response. It seems as though someone has built a sniffer for the Avaya IP Offices and gleaning their registrations.<u></u><u></u></p>
</div></div><br>_______________________________________________<br>
VoiceOps mailing list<br>
<a href="mailto:VoiceOps@voiceops.org">VoiceOps@voiceops.org</a><br>
<a href="https://puck.nether.net/mailman/listinfo/voiceops" target="_blank">https://puck.nether.net/mailman/listinfo/voiceops</a><br>
<br></blockquote></div><br></div>