Public safety personnel targeted by DoS attacks flooding phone lines

Share this article:

Telephone lines for public safety and emergency communication workers have been inundated with bogus calls, an attack characterized by the U.S. Department of Homeland Security and FBI as telephony denial-of-service (TDoS), which is being used to extort money from victims.

Last month, both agencies issued a joint alert to public sector personnel at emergency call centers. On Monday, security blogger Brian Krebs posted the security alert on his website, making the news publicly available.

In the incidents, scammers, described as having a “heavy accent,” called the administrative lines of call centers – not the 9-1-1 lines – pretending to be staff from a collections company for payday loans, the alert said. Using the name of a former, or sometimes non-existent, employee, the callers requested a $5,000 payment from victims. When the victim refuses to pay up, attackers then proceed to flood the centers with calls.

Authorities did not explain how the attacks are being launched, but the alert said that after the initial contact from the fraudsters, calls can occur for “an unspecified, but lengthy period of time.”

The barrage of calls sometimes persists in random spurts over the course of weeks or months, law enforcement said.

The Association of Public-Safety Communications Officials (APCO), a Daytona Beach, Fla.-based trade association, said more than 200 TDoS attacks had been identified by law enforcement, according to a best practices notice posted on its site last Thursday.

“Information continues to be received from multiple jurisdictions indicating the existence of ongoing attacks targeting the telephone systems of public sector entities,” the notice said.

SY Lee, a DHS spokesman, told SCMagazine.com on Tuesday in an email that the agency was “working with [its] federal and private sector partners to develop effective mitigation and security responses” for the incidents.

Vipul Vyas, vice president of financial solutions at Victrio, a Menlo Park, Calif.-based company that provides voice authentication services for call centers, told SCMagazine.com on Tuesday that at least two U.S. banks have been targeted by similar TDoS attacks during the last two weeks.

Vyas did not provide the names of the banks, as they are clients of Victrio whose technology allows users to catch suspicious activity by matching scammers' voices to a database of past fraudulent calls.

If targeted by the scam callers, APCO suggested that victims save the voice recording and make note of all pertinent information – such as phone numbers, account information mentioned by the caller, and the number of calls per hour or day.

Victims also should report the attacks to the Internet Crime Complaint Center (IC3).

 
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

FilmOn accuses DoubleVerify of distributing malware

In readying a libel suit against DoubleVerify, FilmOn says it discovered that the firm deliberately distributed malware.

Schumer: Feds should do 'top to bottom' probe of online drug marketplaces

Sen. Charles Schumer of New York has called on federal law enforcement officials to stop "copy cat websites."

ShellShock vulnerability exploited in SMTP servers

Researchers at Trend Micro found that attackers were targeting Simple Mail Transfer Protocol (SMTP) servers to execute malicious code and an IRC bot.