Comstar Prevents Telecom Frauds
OREANDA-NEWS. March 24, 2010. COMSTAR – United TeleSystems (JSC COMSTAR-UTS, LSE: CMST), the leading supplier of integrated telecommunication solutions in
Spider-FMS, telephone fraud protection and prevention solution identifies and prevents fraudulent activities in ТDM (Time Division Multiplexing) sub-networks and NGN networks. Operator specialists are ready to accomplish implementation of the system to enhance safety of subscriber telephone lines and Internet connections. In 2010, the company intends to enhance the system for network hacker activity prevention to counteract their attempts to affect the telephone IP hardware and computers connected to the Internet. The FMS software has been installed in the COMSTAR-UTS network to protect all
COMSTAR-UTS experts have identified a number of risks, protection against which is provided by the COMSTAR-UTS anti-fraud system. They include: Internet traps, PBX eavesdrop (PBX, Internet gateways, etc.), illegal traffic termination via telephone and IP gateways, Internet spam, viruses and computer attacks (DDoS). (Detailed description of the risks is at the end of this press release).
In 2010, COMSTAR-UTS also plans to launch services for corporate customers and individuals to protect them against these types of threats. With subscription to these services, the company customers LAN and hardware (PBX/router/gateway/server), as well as their personal computers shall be protected. By end this year, the system shall be launched for commercial operation; with its test operation to begin next summer. All
“Various types of fraud related to telephone communication and Internet represent a matter of a very serious concern. Taking into account the role and scope of telecom services integration in all areas of activities of today’s consumers, a level of threats and influence that they may exercise on business development, our well-being and psychological state of adults and children are very serious. Being aware of the level of our responsibility before our subscribers, COMSTAR-UTS introduces a comprehensive anti-fraud system to guarantee protection for both business customers and other carriers using our communication networks, and, in the nearest future, for our individual clients, - Sergey Bugrimov, Corporate Security Director of COMSTAR-UTS, said. – Such matters are also important for carrier business development: according to estimates of international organizations and anti-fraud associations, operator loss from fraudulent activities may account for up to 15% of their income.”
As a part of its integration with MTS, the Group plans to implement security processes, including compliance with common security and anti-fraud policy.
We remind that in 2009, COMSTAR-UTS installed an IMP message processing platform by Bizanga in their network. Thanks to installation of the anti-spam system, some 2.5 million messages reach anti-spam system out of nearly 25.5 million e-mail messages daily on the average, with around 2 million messages being subsequently marked as spam by the system. For more details on the spam filtration system and its functions in COMSTAR-UTS, please click here.
Detailed description of fraud risks in telephone networks and Internet:
1. Internet traps. This threat primarily concerns individual subscribers. This fraudulent activity implies distribution of malware, so-called Trojan horses, that are used for unauthorized re-connection of user modems to another service provider. Besides, expensive international telephone calls are placed, for which an unaware subscriber shall be invoiced. COMSTAR-UTS protect their customers against the said risks.
2. The next hazard area is a PBX, Internet gateway eavesdrop, etc. This threat concerns corporate customers and legal entities that use office PBX or Internet access gateways for their telephone communication (quite often, these services are provided by the same hardware). Normally, frauds or hackers crack hardware remote access passwords (or DISA function – possibility to manage activities of a remote PBX) and use them for traffic transit to expensive routes. Frauds also use illegally obtained Internet access to send spam, make hacker attacks, etc. from the subscriber e-mail address. COMSTAR-UTS offers to its customers to audit and verify technical capabilities for customer PBX service under a contract.
3. Illegal traffic termination via telephone and IP gateways. This is a risk for carriers that use COMSTAR-UTS services related to a transit of traffic between the networks and access to international area access codes. COMSTAR-UTS specialists identify and prevent illegal traffic transit that violates requirements of regulatory documents of the Law “On Communication”, to keep an income of bona fide carriers and ensuring their competitive advantages on the market.
4. Internet spam, viruses and computer attacks (DDoS). To protect against this type of threats, COMSTAR-UTS introduces services for corporate customers, operators and individual subscribers. When subscribed to these services, company customers shall be provided with protection of their LAN and hardware (router, gateway or server). Individual subscribers are provided with anti-spam services, as well as “Parental Control” service to help parents protect their children against negative Internet content, and, if necessary, to restrict child Internet access.
Комментарии