Phantom or Ghost VoIP Calls

What are Ghost Calls and what can you do to prevent them.

Phantom or ghost calls on an IP phone.There has been a noticed increase in the number of ghost calls. There are several reasons that you might receive these types calls.

Ghost or Phantom Call- a phone call that when a person answers finds there is no one on the other end of the call. These calls contrast with silent calls where call centers place a call with no readily available agents.

The most likely is that a test call is made to your number for reasons of building a contact database. However, some scans take place to discover network weaknesses. These represent the ways to identify the type of ghost call.

Calls with a caller ID number, but no one there. Phantom call traffic.


Similarities that point to what is most likely taking place:

A call is received from a local caller ID. When answered The Call is Connected to a Call Center:

Phantom Rings or Ghost Calls that are most likely SIP Scans:

How to prevent SIPVicious ghost calls.Grandstream GXP phone showing security setting.

With more work at home employees security risks increase. Hosted VoIP or cloud PBX providers routinely initiate very tight security control into their platforms that result in very few intrusions. More limited companies that have their own PBX phone systems typically lack specialized IT personnel. These smaller companies often depend on in-house admin or a phone technician to ensure systems and remote phones are secure. In all cases, ensure firmware of all devices, like routers and IP phones have been updated. PBX software should have all security patches installed regularly. International Calling should be disabled if not needed and "best practices" enacted. Use non-standard ports. The use of VPNs for remote workers provides distinct advantages, as does the use of HTTPS and SFTP.
Some IP phones include essential security settings to disable direct IP calls. For instance, on a Grandstream GXP21xx phone, there is an important security setting "Accept Incoming SIP from Proxy Only" that needs to be set to Yes.
Yealink settings for preventing SIP scans.On Yealink IP phones there are two settings; "Accept SIP Trust Server Only" needs to be set to Enabled and "Allow IP Call" to Disable. Both settings should be found under the Features Tab on the General Information Page.


A "one-ring" phone scam that is different, but one you need to be aware of.
"One-ring" cell phone scam.
Neighbor Spoofing

The term Neighbor Spoofing refers to calls made showing a caller ID with the first six digits, namely the area code and local exchange of your locality. The tactic is built upon the reasoning that you might be more likely to answer the call, believing it may be someone close by. These calls appear to look like they are coming from a local business or even a neighbor. Despite present laws preventing these strategies, government authorities caution that neighbor spoofing and robocall scams are currently on the rise.

Conclusion

PBX security risks.For those companies that have recently deployed work-at-home employees connected to the office PBX, attention to security remains a high priority. Keeping employees informed of security intrusions is essential. Recently there has been an increase in all types of nefarious activities, however, by remaining attentive to some of the techniques used, companies can take precautions to reduce risks to a minimum.

 

Best Practices to prevent unwanted access to your PBX.

Network best practices should include ensuring your phone system's security vulnerabilities are closed. Most breaches occur to easy targets. Those that are looking to gain access scan millions of IP addresses looking for the most vulnerable targets. Ten Tips for Better PBX Security.