Protection of voice telecommunications

Effective protection against TDoS attacks and Caller ID spoofing

A Telephony Denial of Service (TDoS) attack is an attempt to make the telephone system inaccessible to users by blocking incoming and/or outgoing calls.

Phone spoofing (Caller ID spoofing) is a malicious technique in which attackers falsify the phone number or name displayed on the subscriber’s device screen to impersonate a trusted source.

We protect your telephony from TDoS, load peaks, and Caller ID spoofing. We offer VoIP/SIP auditing, filtering and IVR, rate-limiting on SBCs, trunk backups across multiple carriers, and response and communication with providers and regulators.

Who is at risk?

Any business relying on calls is potentially vulnerable to TDoS attacks and Caller ID spoofing. However, certain types of businesses may face a higher risk due to the nature of their operations. Examples include:

1
Contact centers
Customer service centers and various hotlines are often the primary point of contact between organizations and citizens. Disruptions to contact centers can lead to significant financial and reputational damage, even leading to the organization’s complete shutdown.
2
Financial institutions
Banks, insurance companies, and other financial institutions are frequent targets for attackers aiming to disrupt services or steal sensitive customer information. Successful attacks can result in substantial financial losses and reputational damage.
3
Government and public institutions
Government agencies, Emergency Call Centers (ECC), Public Safety Answering Points (PSAP), and other public institutions often face attacks from political activists and other groups attempting to disrupt services or gain access to sensitive information. A successful attack can disrupt critical services and compromise data security.
4
Healthcare providers
Hospitals and healthcare facilities rely on online services to manage patient records and communication. A successful attack can disrupt services and compromise sensitive patient data.
5
Telecom operators
TDoS attacks on telecom operators and VoIP providers cause direct financial losses due to malicious calls and billing system overload, and also lead to service degradation for legitimate subscribers. In the long term, this can lead to reputational damage, customer churn, regulatory claims, and unplanned costs for investigations and infrastructure reinforcement.
6
Online companies
Online retailers heavily reliant on web traffic for revenue are particularly vulnerable. An attack can disrupt online sales. Online gaming companies are attractive targets for attackers seeking to disrupt services or steal valuable in-game items. News websites, online video streaming services, and other media companies may be targeted to disrupt services or gain unauthorised access to sensitive information.

What is a TDoS attack?

A TDoS (Telephony Denial of Service) attack is a form of cyber attack that aims to disrupt phone systems, such as those used by call centres or emergency services. The objective is to overwhelm the system with a high volume of traffic, rendering it unavailable. Typically, the attack involves automated calls or messages generated by bots or compromised systems, flooding the target system and causing service disruptions. This type of attack can result in significant financial and reputational damage.

To perform a TDoS attack, attackers overflow all available telephone resources, so that there is no free telephone line. Attackers often use TDoS, demanding a ransom to stop the attack. TDoS are also used to block bank notifications about unauthorised transfers of funds, etc. Sometimes TDoS attacks occur as a result of errors or peak loads of legitimate users. TDoS attacks can be short or last for several days. Regardless of the TDoS attack’s nature, we offer an effective remediation set for peak loads.

TDoS attacks can be classified into two categories based on their execution mode:

  • Manual TDoS: These attacks are manually carried out by individuals or groups using tools like automated diallers to initiate a large number of calls or messages to the target system. Manual TDoS attacks are usually motivated by extortion, revenge, political or other reasons.
  • Automated TDoS: These attacks involve automated tools like bots or malware, which can initiate a high volume of calls or messages to the target system without human intervention. Automated TDoS attacks are often driven by financial gain, as they can disrupt call centres or emergency services and demand ransom payments for service restoration.
Free consultation

Voice telecommunication protection methods

To mitigate the risk of TDoS attacks, businesses can employ the following prevention methods:

  1. Network and infrastructure hardening: Strengthening network and infrastructure security by implementing such measures as firewall protection, intrusion detection systems, and network traffic monitoring.
  2. Rate limiting and traffic shaping: Setting limits on the number of calls that can be made to a phone system within a specific period and prioritising certain types of traffic over others to restrict the impact of TDoS attacks.
  3. Call blocking and filtering: Implementing mechanisms to block calls from known TDoS sources or suspicious numbers to prevent attacks at an early stage.
  4. Incident response planning: Developing an incident response plan that includes steps to quickly identify and mitigate an attack, as well as procedures for reporting the attack to law enforcement and communicating with customers and stakeholders.
  5. Other telecom-specific features: SIP level (INVITE/REGISTER rate-limit, protection against malformed SIP, TLS/SRTP, signaling and RTP separation, 603 Decline/486 Busy failure during overload, CAPTCHA/IVR questions before transferring to the operator), identification (RFC 8224, STIR/SHAKEN, including A/B/C attestation check on the provider side), operator measures (call gapping/overflow, call distribution across trunks, blocklist/traceback agreements, requirements for the provider’s presence in the Robocall Mitigation Database), architecture (PBX/SBC redundancy, geo-distribution, separation of test telephony from production), etc.

Voice telecommunication protection services

serviceAnalysis and testing of telecommunication security

A) PBX IP interface test in grey-box mode. Simulation of various attacks on VoIP.

B) Configuration analysis in white-box mode. The report includes recommendations for addressing security vulnerabilities and configuration flaws.
serviceImplementation of call filtering and voice menu

Development and implementation of a system for recognising suspicious incoming calls based on Machine Learning (ML). Building an Interactive Voice Response (IVR) where suspicious calls will be automatically redirected.
serviceComplex protection of telecom platform

Analysis of the requirements of your jurisdictions and the capabilities of telecom operators. SIP-level measures, identification, operator measures, architecture. Development of a fault-tolerant platform with the use of several trunks to different telecom operators. Consultations on how to make arrangements with the operators so that they filter calls and put them in blocklists in addition to local protection.

Our experience

  1. More than 80 projects on security assessment and penetration testing of IP networks.
  2. Permanent delivery for the information security department of one of the leading national telecom operators.
  3. Testing various kinds of mobile VoIP clients.
  4. Testing of corporate IP-PBX phone systems.
  5. Penetration tests of IMS operators, including 4G, with signalling via SIM over IPv6 and with traditional GSM/SS7 signalling.
  6. Continuous cooperation with the cyber police and other government agencies.

Service summary

⏳ Duration of project

Several weeks to several months, depending on project scope and requirements.

🎁 Can it be free or have a trial period?

Free consultation and initial analysis of business requirements. Use our virtual expert.

💼 What type of business needs it?

Telecommunications providers, financial institutions, healthcare providers, government agencies, and any organisation that transmits sensitive data.

💡 When is this service needed?

When you are facing new cyber threats or regulatory requirements, or want to ensure business continuity or the security of your communications and sensitive data.

📈 Your profit

Avoided costly fines for non-compliance, security breaches or downtime, which can result in financial losses and reputational damage.

⚙️ Our methods and tools

SIP level, STIR/SHAKEN (alternatives vary by jurisdiction), operator measures, architecture. Encryption, firewalls, access control systems, penetration testing, IDS, IPS, VNP, SIEM, IVR, etc.

📑 Deliverables

Security policies and procedures, risk assessments, training materials, incident response plans, implementation and testing reports, etc. 

Check out our additional services and business cases. Send the form below to request telecommunication protection services. Get a free consultation.

REQUEST A QUOTE

FAQ

TDoS (Telephony Denial of Service) attacks aim to disrupt telecommunications services by flooding them with calls or messages. To protect against these attacks:

  • Implement Traffic Analysis and Filtering: Use traffic analysis systems to identify abnormal patterns characteristic of TDoS attacks and filter out malicious traffic.
  • Deploy Anti-Spam Measures: Install anti-spam filters and IP blacklists to filter out unwanted calls and messages potentially part of a TDoS attack.
  • Implement Rate Limiting: Limit the number of calls or messages from a particular source to prevent system overload.
  • Monitor Network Traffic: Continuously monitor and analyze network traffic in real-time to detect and respond to TDoS attacks promptly.
  • Prepare an Emergency Response Plan: Have a well-prepared plan to reduce damage caused by TDoS attacks.
  • Implement DDoS Protection: Use DDoS protection systems to detect and block incoming attacks while allowing legitimate traffic.

To enhance IP-telephony security:

  • Secure your Network: Implement firewalls, intrusion detection systems, and other network security measures to prevent unauthorized access.
  • Use Encryption: Encrypt transmitted data to prevent eavesdropping and ensure conversation confidentiality.
  • Implement Strong Authentication: Use secure authentication protocols like two-factor authentication or biometric authentication.
  • Regularly Update Software: Keep IP-telephony software up-to-date with the latest security patches.
  • Monitor your Network: Implement network monitoring tools to detect and respond to security threats promptly.
  • Educate Users: Train users on best practices, including recognizing phishing scams, creating secure passwords, and reporting suspicious activity.

To protect against peak loads:

  • Ensure Scalability: Regularly assess and upgrade the system's capacity to handle increased demand without network congestion or service degradation.
  • Implement Load Balancing: Distribute workload across multiple servers or network resources to prevent congestion and service degradation during peak loads.
  • Use Traffic Shaping: Control traffic flow by prioritizing critical traffic (e.g., emergency calls, business-critical communications) during peak loads.
  • Manage Bandwidth: Allocate more bandwidth to critical traffic during peak loads to minimize the impact of network congestion.
  • Develop a Disaster Recovery Plan: Ensure your system can quickly recover from network congestion or service degradation caused by unexpected events like peak loads.

By implementing these strategies, telecommunications systems can be better protected against TDoS attacks, IP-telephony security threats, and peak load challenges, ensuring more reliable and secure communication services.

Business cases of projects we completed

Audit of smart contracts and blockchain
Business Automation
Information security incident response and investigation
Managed security and compliance (ISO 27001, etc.)
Security analysis of software source code
Security assessment: audits and penetration tests
Security Operations Center cases