In recent weeks, we have once again observed an increase in hacking attacks targeting telecommunication systems.These attacks are conducted from abroad, aiming to exploit your telecommunication system as a gateway for unknown external parties to make calls to exotic countries. These calls are often unregulated in terms of pricing, making them extraordinarily expensive. The damage caused to a company over just a single weekend can commonly reach tens of thousands or even hundreds of thousands of euros.

How do these attacks occur?

Hackers use bots to search for "holes" in IP networks, often finding inadequately secured IP-PBX systems or applications running on PBX that rely on network communication. They exploit these vulnerabilities remotely to modify the IP-PBX configuration, turning it into a gateway for international calls (most commonly between Asia and Africa or South America). The preparation for such an attack may occur during the workweek, while the actual system breach typically happens over weekends or holidays when no one notices changes in the IP-PBX configuration or behavior.

Another common method involves finding security flaws in applications or weak personal access passwords. This opens up possibilities for attacks even on PBX systems connected to the operator's network via traditional lines (ISDN/analog).

How to defend against hacker attacks?

A guide on how to protect your PBX system from hacker attacks is essentially the same as securing other elements of your network.The foundation of everything is strong passwords – always and everywhere. Whether it’s access to the server or "just" configuring a phone, strong passwords are a must.If your VoIP PBX is accessible from the internet, a firewall is absolutely necessary, ideally integrated directly into the VoIP PBX. Not all attacks necessarily originate from external sources, so don’t underestimate the importance of physical security for your PBX system.Properly configured monitoring of PBX activity can help you detect issues in time. And if an attack cannot be prevented, configuring call permissions (where calls can be made) and spending limits (how much can be spent) can significantly reduce the financial impact of the attack.

Do you have concerns about your system's security? Contact us.

If you have any concerns about the security of your telecommunication system, don’t hesitate to reach out. Our team of seasoned professionals in telecommunications will review your system’s configuration, identify potential vulnerabilities, and propose a set of measures to minimize the likelihood of a successful hacking attack.


For more information or to consult on finding the right solution, contact us at info-cz@alcasys.eu or call +420 739 779 977.