Toll fraud on Flashtalk Toll fraud on Flashtalk Brutalis (TechnicalUser) (OP) 24 Mar 17 13:36 Have a couple of clients now getting hit by toll fraud by way of off prem notification through Flashtalk. Anyone know how they're doing this. I didn't think it was possible. RE: Toll fraud on Flashtalk FirebirdScrambler (Programmer) 24 Mar 17 14:32 Are you sure they aren't getting in via a DID or Auto Attendant line's mailbox?. It would be wise to force everybody to have their passcodes changed and see if the passcode digit length can be increased to make it harder to crack. Also see if you can set it so that the users have to change their passcode on a regular basis. Firebird Scrambler Nortel & Avaya Meridian 1 / Succession & BCM / Norstar Programmer Website = http://somertel.com linkedin RE: Toll fraud on Flashtalk curlycord (Programmer) 24 Mar 17 16:45 See our FAQ's button up top for issues already listed. Here is yours http://www.tek-tips.com/faqs.cfm?fid=7271 ________________________________________ Add me to LinkedIN **New Allworx Forum** =----(((((((((()----= www.curlycord.com Toronto, CAN RE: Toll fraud on Flashtalk JMack (TechnicalUser) 16 May 17 11:32 I also had this issue on several Flash systems that were thought to be exempt from this type of hacking. I wouldn't want to post how it is done specifically but they use Telco provided call forwarding. The key is good solid passwords on all mailboxes including general delivery and system manager mailboxes. This prevents the programming. Another option to preventing the current hack on this system is to eliminate off premise notification from the mailboxes if the customer doesn't use it. You can do this by changing the class of service to 5 which will eliminate any set up that is already programmed. If the customer doesn't require it also eliminate the call forwarding and international calling feature from the Telco. This eliminates their paths. I visited all Flash customers as a precaution and found the hack in several that had not been reported.