Hello all!
I've been looking on this forum to find ressources on SMDR logs to track fraudulent international calls but I could not make sense of it for my context so maybe one of you expert could help me?
Here is an example of our SMDR logs for a fraudulent call:
03/13 02:27 00:00:33 7783 7783 0 A T323T T302
001 17783 A0010223A A0010211
03/13 02:27 00:00:52 T302 0000 T51940223770 8080 7000 7783T T323
001 1940223770 8080 A0010211A A0010223
From my understanding, from the 3 line, an inbound call overnight from T51940223770 on our main trunk (T3xx) is answered by messaging (7000) NuPoint and redirected to our main menu (8080).
From there the call seem to go to a VM via one of the NuPoint VM port (778x numbers).
After I get lost how they do it but from the log I understand a supervised transfer (T) is made from that 7783 port to an external number over our main trunk.
I think the first little is that external outbound call being made to the operator and then transferred to whatever international number that was requested from the operator.
After I dont have any traces of said call.
Now, did I understand those logs correctly? And since the NuPoint seems to be involved, any way I could trace it to a specific ext/VM that's obfuscated behind that NuPoint port?
We checked and VMs are not allowed to dial out as per policy, nor do we have any DISA in place. I would really help me close the gap if I new what the exploit was exactly!
We have a Mitel 3300 with NuPoint for VM (and some other features I believe).
Thank you!