Greetings all,
After 5 years of smooth sailing, we've been the targets of someone trying to abuse our system. Someone has been making calls to Saudi Arabia and the Philippines remotely (yes, because of the destinations, I did notify the FBI). To confirm that we're squarely in their sites, I got a call this morning from "Sheila," a woman with a heavy Asian accent, from "Asian Technologies" asking what our 800 # was. The CLID came from a 213 number and when I called back, it said it wasn't a real number. Despite the pathetic Social Engineering effort, I'm quite concerned.
I want to know is how they managed to do it.
I assume they're getting in through a weak vmail password and using call forwarding to redirect calls overseas. If I'm wrong, is anyone aware of any security holes in either MICS 4.1 or VMail 4.0? Assuming I'm right, is there a way for me to check all the passwords and call forwarding settings other than manually walking through each account?
Thanks much,
MB
After 5 years of smooth sailing, we've been the targets of someone trying to abuse our system. Someone has been making calls to Saudi Arabia and the Philippines remotely (yes, because of the destinations, I did notify the FBI). To confirm that we're squarely in their sites, I got a call this morning from "Sheila," a woman with a heavy Asian accent, from "Asian Technologies" asking what our 800 # was. The CLID came from a 213 number and when I called back, it said it wasn't a real number. Despite the pathetic Social Engineering effort, I'm quite concerned.
I want to know is how they managed to do it.
I assume they're getting in through a weak vmail password and using call forwarding to redirect calls overseas. If I'm wrong, is anyone aware of any security holes in either MICS 4.1 or VMail 4.0? Assuming I'm right, is there a way for me to check all the passwords and call forwarding settings other than manually walking through each account?
Thanks much,
MB