Advanced searches left 3/3
Search only database of 8 mil and more summaries

Area code 284

Summarized by PlexPage
Last Updated: 16 November 2020

* If you want to update the article please login/register

General | Latest Info

This is one of the versions of the scam going on, so be careful yelpers here's HOW IT work: You will receive a message on your answering machine or your pager, which asks you to call a number beginning with Area code 809. The reason you're asked to call varies. IT can be to receive information about family member who has been ill, to tell you someone has been arrest, die, to let you know you have won a wonderful prize, etc. In each case, you are told to call the 809 number right away. Since there are so many new area cod these days, people unknowingly return these calls. If you call from the US, you will apparently be charged 25 per-minute! Sometimes the person who answers the phone will speak broken English and pretend not to understand you. Other times, you'll just get long recorded message. The point is, they will try to keep you on the phone as long as possible to increase charges. Unfortunately, when you get your phone bill, you'll often be charged more than 100. 00. Here's WHY IT work: 809 area code is located in the British Virgin Islands. The 809 area code can be used as a pay-per-call number, similar to 900 numbers in the US. Since 809 is not in the US, IT is not covered by US regulations of 900 numbers, which require that you be notified and warned of charges and rates involved when you call pay-per-call number. There is also no requirement that the company provide a time period during which you may terminate call without being charge. Further, whereas many US phones have 900 number blocking to avoid these kinds of charges, 900 number blocking will not prevent calls to the 809 Area code. Truth or Fiction websites say this is a true scam, so be careful yelpers truthorfiction.

* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions.

* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions

One ring scam

284 area code has been linked to a form of telephone fraud known as one ring scam. Person perpetuating the scam calls victim via robodialer or similar means, sometimes AT odd hours of night and then hangs up when the phone is answer, with hope that the victim will be curious enough to call the number back. When victim Do THIS, automatic 19. 95 international call fee is charged to their account as well as 9. 00 / min thereafter. Similar scams have been linked to Grenada, Antigua, Jamaica and the Dominican Republic.

* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions.

* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions

Traffic Pumping

General Best Practices for Working with Bandwidth

BWFBP147Develop a Fraud-Contact distribution email address list. This will allow Bandwidth to contact more than one person at your company about fraudulent events or behaviors. Youll need to manage the distro list, as your staff changes.
BWFBP148Update all fraud contacts every 6 months within your account and reach out to your Bandwidth Support Team to alert them that you made edits/changes.
BWFBP149Any/All Fraud-Contact distribution email address lists provided to Bandwidth must reach people that are on-duty or on-call, in a way that allows Bandwidth to communicate with someone regarding fraud events 24 hours a day, 7 days a week, 365 days a year (24X7X365).
BWFBP150Any/All Fraud-Contact distribution phone number lists provided to Bandwidth must reach people that are on-duty or on-call, in a way that allows Bandwidth to communicate with someone regarding fraud events 24 hours a day, 7 days a week, 365 days a year (24X7X365).
BWFBP151Any/All Fraud-Contact distribution lists provided to Bandwidth must reach people that are technically capable of mitigating fraudulent events on your network.
BWFBP152Any/All Fraud-Contact distribution lists provided to Bandwidth must reach people that are authorized to make network decisions, such as blocking fraudulent traffic, disabling fraudulent international calling, and/or accepting Fraud charges, as spelled out in your Bandwidth Master Service Agreement - Contract.
BWFBP153If you need to reach the Bandwidth Fraud Mitigation Team, you can contact us in any of the following ways: Email: voicesecurity@bandwidth.com Phone Customer Support: 855-864-7776 Phone Bandwidth Corporate: 888-969-5009, Press 3, Press 1, Press 1

When you make a long distance call, that call is generally handled by a number of telephone companies-Your local carrier delivers call from your phone to a long distance company, long distance company carries call most of the way to its destination, and then the call is handed off to local carrier that serves party youre calling. Under today's rules, long distance companies pay fee, call access charge, to local carriers that deliver calls to call party. Access stimulation, also referred to as traffic pumping, occurs when a local carrier with high access charge rates enters into arrangement with another company with high call volume operations, such as chat lines, adult entertainment call, or free conference calls. Arrangement inflates or stimulates the number of calls into local carriers ' service area, and the local carrier then shares a portion of its increased access revenues with the Free Service provider, or provides some other benefit to that company. Local companies ' profits from such arrangements are typically so great that its charges become unreasonable and unlawful under FCC regulations. Access stimulation is harmful to consumers and competition in a number of ways. First, it distorts investment incentives. As result of access stimulation scheme, long distance companies are forced to recover inflated access costs from all of their customers, even though many of them do not use services that cause stimulation in demand. It also harms competition by giving companies that offer, for instance, free conference calling services competitive advantage against companies that charge their customers for service. Allegations of access stimulation have led to a number of disputes between local and long distance telephone companies, number of have been resolved by the Commission through the formal complaint process. In addition, Commission recently adopted rules designed to reduce the ability to engage in access stimulation. The Enforcement Bureau will enforce these new rules by continuing to resolve disputes between individual companies, either through mediation or by resolving formal complaints.


Area Code Scammers Overview

Area Code Scammers can offer you many choices to save money thanks to 16 active results. You can get a discount of up to 50 % off. New discount codes are constantly updated on Couponxoo. The latest ones are on Nov 16 2020. 8 new Area Code Scammers results have been found in the last 90 days, which means that every 11, new Area Code Scammers result is figured out. As Couponxoos tracking, online shoppers can recently get save of 50 % on average by using our coupons for shopping at Area Code Scammers. This is easily done by searching on Couponxoos Box.

* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions.

Table

BWFBP112When acquiring toll-free (TF) phone numbers from Bandwidth, put them in an aging database and dont place them into service until you need to assign them to your customer(s). If these TF phone numbers arent in service, they cant and should not receive fraudulent/unwanted inbound calls from bad actors.
BWFBP113When holding/aging TF phone numbers from Bandwidth, monitor inbound call attempts to this TF phone number as a way of verifying if a TF number is "clean" while its out of service. If you receive many unwanted/unsolicited inbound calls to this TF phone number while its not in service, notify the Bandwidth Fraud Mitigation Team immediately at voicesecurity@bandwidth.com and alert them of the suspicious traffic.
BWFBP114If you need to offer a toll-free phone number for your services, use a pool of toll-free numbers and cycle through them when placing them into use. An example of this use case would be to use a different toll-free number from a pool of numbers for every new conference call, in a conference calling service. This prevents bad actors from focusing on and exploiting a single toll-free number .
BWFBP115Alert Bandwidths Fraud Mitigation Team and SOMOS of any new Toll-Free Fraudulent calls/events and well engage an industry Toll-Free Fraud Traceback Group that will conduct tracebacks to discover the source(s) and provide information directly to law enforcement.
BWFBP116Refrain from advertising TF numbers publicly via websites/email/social media. This type of communication can be seen by bad actors and lead to unwanted inbound traffic to TF phone numbers. This type of toll-free fraud is often seen in instances where TF phone numbers are used and publicly advertised to access conference bridges.
BWFBP117If a toll-free phone number must be used to access your services, implement a pool of many TF phone numbers and rotate/cycle through it to keep bad actors guessing.

Table10

BWFBP106Consider MANDATING the use of an authorization code, or PIN, that must be used by customers, employees, and end-users before placing international calls.
BWFBP107As end-users attempt to make international calls through your network, ensure that their account code, authorization code, or PIN is accurately and securely VERIFIED before they are allowed to make international calls.
BWFBP108Determine which countries, your platform specifically supports calling to, and then restrict calling to all the remaining countries. Limit international dialing to only authorized customers, employees, and end-users who require it. Restrict all others.
BWFBP109Consider blocking the following frequently Fraudulent countries in your systems, your network and in your customers systems: AC Ascension Islands 247 AG Antigua/Barbuda 268 AI Anguilla 264 AS American Samoa 684 BB Barbados 246 BM Bermuda 441 BS Bahamas 242 CD Democratic Republic of the Congo 243 CF Central African Republic 236 CG Congo 242 CZ Czech Republic 240 DM Dominica 767 DO Dominican Republic 809 829 849 GD Grenada 473 GQ Equatorial Guinea 240 GU Guam 671 HT Haiti 509 JM Jamaica 876 KN St. Kitts Nevis 869 KY Cayman Islands 345 LC St. Lucia 758 LT Lithuania 370 MA Morocco 212 MF St Martin 590 MP Northern Mariana Islands 670 MS Montserrat 664 MV Maldives 960 PK Pakistan 92 PW Palau 680 SC Seychelles 248 SX Sint Maarten 721 TC Turks and Caicos Islands 649 TD Chad 235 TN Tunisia 216 TT Trinidad and Tobago 868 UG Uganda 256 VC Saint Vincent and the Grenadines 784 VG British Virgin Islands 284 VI U.S. Virgin Islands 340 SL Sierra Leone 232 SD Sudan 249 LR Liberia 231 LV Latvia 371
BWFBP110Look for large volumes of SIP 487 response codes in short periods of time on your network. Using something known as Hyper-duration robocalls, bad actors typically probe networks looking for cracks in the network that will allow completed international calls. During these hyper-duration storms, bad actors typically launch large volumes of SIP INVITE messages in a short period of time (thousands of INVITE messages within 5 mins or less), followed very rapidly by SIP HANGUP (487) messages. Its important to note that call attempts that dont complete, dont necessarily equal unsuccessful calls. All rapid-fire attempts/hangups in a short period of time should be considered a red flag for possible fraudulent activities in the near future. When you see more than an average of about 60 SIP 487 messages per hour, look at your traffic for fraudulent activity and calls to fraudulent destinations. If you discover suspicious/fraudulent behaviors, take measures to block/prevent future attempts of these types of international calls from reaching Bandwidth.
BWFBP111Ensure that passwords to your companys network equipment are unique to each unit of equipment, contain random characters, made random in length, and are NOT the passwords that were pre-configured at the time of purchase/installation. These passwords must be changed often and only shared with personnel authorized to make changes to your network equipment. Zero-knowledge password managers are highly recommended.

Table11

BWFBP106Consider MANDATING the use of an authorization code, or PIN, that must be used by customers, employees, and end-users before placing international calls.
BWFBP107As end-users attempt to make international calls through your network, ensure that their account code, authorization code, or PIN is accurately and securely VERIFIED before they are allowed to make international calls.
BWFBP108Determine which countries, your platform specifically supports calling to, and then restrict calling to all the remaining countries. Limit international dialing to only authorized customers, employees, and end-users who require it. Restrict all others.
BWFBP109Consider blocking the following frequently Fraudulent countries in your systems, your network and in your customers systems: AC Ascension Islands 247 AG Antigua/Barbuda 268 AI Anguilla 264 AS American Samoa 684 BB Barbados 246 BM Bermuda 441 BS Bahamas 242 CD Democratic Republic of the Congo 243 CF Central African Republic 236 CG Congo 242 CZ Czech Republic 240 DM Dominica 767 DO Dominican Republic 809 829 849 GD Grenada 473 GQ Equatorial Guinea 240 GU Guam 671 HT Haiti 509 JM Jamaica 876 KN St. Kitts Nevis 869 KY Cayman Islands 345 LC St. Lucia 758 LT Lithuania 370 MA Morocco 212 MF St Martin 590 MP Northern Mariana Islands 670 MS Montserrat 664 MV Maldives 960 PK Pakistan 92 PW Palau 680 SC Seychelles 248 SX Sint Maarten 721 TC Turks and Caicos Islands 649 TD Chad 235 TN Tunisia 216 TT Trinidad and Tobago 868 UG Uganda 256 VC Saint Vincent and the Grenadines 784 VG British Virgin Islands 284 VI U.S. Virgin Islands 340 SL Sierra Leone 232 SD Sudan 249 LR Liberia 231 LV Latvia 371
BWFBP110Look for large volumes of SIP 487 response codes in short periods of time on your network. Using something known as Hyper-duration robocalls, bad actors typically probe networks looking for cracks in the network that will allow completed international calls. During these hyper-duration storms, bad actors typically launch large volumes of SIP INVITE messages in a short period of time (thousands of INVITE messages within 5 mins or less), followed very rapidly by SIP HANGUP (487) messages. Its important to note that call attempts that dont complete, dont necessarily equal unsuccessful calls. All rapid-fire attempts/hangups in a short period of time should be considered a red flag for possible fraudulent activities in the near future. When you see more than an average of about 60 SIP 487 messages per hour, look at your traffic for fraudulent activity and calls to fraudulent destinations. If you discover suspicious/fraudulent behaviors, take measures to block/prevent future attempts of these types of international calls from reaching Bandwidth.
BWFBP111Ensure that passwords to your companys network equipment are unique to each unit of equipment, contain random characters, made random in length, and are NOT the passwords that were pre-configured at the time of purchase/installation. These passwords must be changed often and only shared with personnel authorized to make changes to your network equipment. Zero-knowledge password managers are highly recommended.

Table12

BWFBP118Use data analytics to map customers sign-up information with valid/legitimate addresses, credit card accounts, email addresses, and phone numbers. Keep track of suspicious sign-ups and immediately disable/disconnect fraudulent accounts as they become known.
BWFBP119If phone numbers are disconnected because they were found to be used in a fraudulent manner to perpetrate a phishing scam, DONT auto-provision phone numbers to the same account.
BWFBP120Sometimes bad actors use call-forwarding to evade detection. Oftentimes, they use multiple call forwarding layers to evade detection. If your network or service offering includes a call-forwarding function, be aware of customers who enter large numbers of entries in your call forwarding tables, especially through web page interfaces. Please send all call-forwarding tables/forwarding information that contain Bandwidth phone numbers to voicesecurity@bandwidth.com .
BWFBP121Keep an eye out for accounts that use numerous phone numbers across a large geographic area. Please report all accounts, and account information, that have numerous phone numbers across large geographic areas to voicesecurity@bandwidth.com .
BWFBP122Monitor for and be aware of end users who cycle through phone numbers at higher than normal rates, volumes, and frequencies. This rapid phone number swapping behavior could indicate that they're trying to avoid detection by carriers, law enforcement, and government agencies. The perpetrators of the IRS and Social Security scam calls will typically swap phone numbers at unusual rates to cover their tracks after initial calls are placed and received.

Table13

BWFBP118Use data analytics to map customers sign-up information with valid/legitimate addresses, credit card accounts, email addresses, and phone numbers. Keep track of suspicious sign-ups and immediately disable/disconnect fraudulent accounts as they become known.
BWFBP119If phone numbers are disconnected because they were found to be used in a fraudulent manner to perpetrate a phishing scam, DONT auto-provision phone numbers to the same account.
BWFBP120Sometimes bad actors use call-forwarding to evade detection. Oftentimes, they use multiple call forwarding layers to evade detection. If your network or service offering includes a call-forwarding function, be aware of customers who enter large numbers of entries in your call forwarding tables, especially through web page interfaces. Please send all call-forwarding tables/forwarding information that contain Bandwidth phone numbers to voicesecurity@bandwidth.com .
BWFBP121Keep an eye out for accounts that use numerous phone numbers across a large geographic area. Please report all accounts, and account information, that have numerous phone numbers across large geographic areas to voicesecurity@bandwidth.com .
BWFBP122Monitor for and be aware of end users who cycle through phone numbers at higher than normal rates, volumes, and frequencies. This rapid phone number swapping behavior could indicate that they're trying to avoid detection by carriers, law enforcement, and government agencies. The perpetrators of the IRS and Social Security scam calls will typically swap phone numbers at unusual rates to cover their tracks after initial calls are placed and received.

Table2

BWFBP112When acquiring toll-free (TF) phone numbers from Bandwidth, put them in an aging database and dont place them into service until you need to assign them to your customer(s). If these TF phone numbers arent in service, they cant and should not receive fraudulent/unwanted inbound calls from bad actors.
BWFBP113When holding/aging TF phone numbers from Bandwidth, monitor inbound call attempts to this TF phone number as a way of verifying if a TF number is "clean" while its out of service. If you receive many unwanted/unsolicited inbound calls to this TF phone number while its not in service, notify the Bandwidth Fraud Mitigation Team immediately at voicesecurity@bandwidth.com and alert them of the suspicious traffic.
BWFBP114If you need to offer a toll-free phone number for your services, use a pool of toll-free numbers and cycle through them when placing them into use. An example of this use case would be to use a different toll-free number from a pool of numbers for every new conference call, in a conference calling service. This prevents bad actors from focusing on and exploiting a single toll-free number .
BWFBP115Alert Bandwidths Fraud Mitigation Team and SOMOS of any new Toll-Free Fraudulent calls/events and well engage an industry Toll-Free Fraud Traceback Group that will conduct tracebacks to discover the source(s) and provide information directly to law enforcement.
BWFBP116Refrain from advertising TF numbers publicly via websites/email/social media. This type of communication can be seen by bad actors and lead to unwanted inbound traffic to TF phone numbers. This type of toll-free fraud is often seen in instances where TF phone numbers are used and publicly advertised to access conference bridges.
BWFBP117If a toll-free phone number must be used to access your services, implement a pool of many TF phone numbers and rotate/cycle through it to keep bad actors guessing.

Table3

BWFBP123Never send text messaging content that is related to S.H.A.F.T.: Sex Hate Alcohol Firearms Tobacco (including cannabis) Text messages with content thats directly or remotely related to these categories will most likely be blocked as SPAM by either Bandwidth and/or one or more Tier 1 Mobile Network/Handset operators in the U.S.
BWFBP124GET CONSENT FROM YOUR USERS Make sure users explicitly say they want messages from you. The single most important practice is ensuring you have accurate, reliable opt-ins specific to the type of messages youre sending consumers. Generally, opt-out rates are consistently low when you have obtained reliable and clear consumer opt-in consent. At any time, Bandwidth or other wireless carriers may request evidence of documented opt-in consent for a particular message sent from you (or your customers).
BWFBP125DONT USE PUBLICLY AVAILABLE URL SHORTENERS. These same free-public URL shorteners are used by bad-actors to evade detection and get their SPAM messages passed through text messaging platforms. Bandwidth encourages you to build custom URL shorteners that relate to your company or product name. Theyre still free. If a custom URL shortener is found to be used for fraudulent purposes, Bandwidth can and will block messages containing them. Bandwidth and partnering downstream carriers will block text messages that contain these publicly available URL shorteners: goo.gl bit.ly tinyurl.com tiny.cc lc.chat is.gd soo.gd s2r.co clicky.me budurl.com Bc.vc
BWFBP126Provide opt-out functionality within the text messages sent, so receiving end-users can easily opt-out at their discretion. Failing to have opt-out in the text messages sent may lead to carriers flagging and possibly blocking these messages as SPAM.
BWFBP127PROCESSING STOP KEYWORDS Be sure your users can opt out of receiving messages. Consumer opt-in and opt-out functionality is enforced at the network level via the STOP and UNSTOP keywords. This functionality cant be disabled for service providers or message senders. Message senders have obligations to process the opted-out consumer phone number, so its removed from all distribution lists and logged as opted out from SMS communications. This ensures that withdrawal of consumer consent is honored and future messages arent attempted. Examples of valid opt-out messages: STOP Stop stop STop For toll-free SMS, theres no need for you to send an acknowledgment to the consumer. The generic opt-out confirmation message returned to a consumer from your network provider gives instructions on how to opt back into service Example: NETWORK MSG: You replied with the word STOP which blocks all texts sent from this number. Text back UNSTOP to receive messages again.
BWFBP128PROCESSING UNSTOP AND START KEYWORDS Allowing users to opt back in after opting out at the network level. A consumer can opt back in at any time to receive messages by texting the keyword UNSTOP or "START" to a message senders phone number. The keyword is not case sensitive and triggers an opt-in only when sent as a single word, with no punctuation or leading spaces (any trailing spaces are trimmed). If the consumer uses the opt-in keyword within a sentence an opt-in is not triggered. Examples of valid opt-ins: UNSTOP Unstop unstop UNStop START Start start The message returned to a consumer is generic and informs the consumer they can start two-way texting with the message senders phone number again. Example: NETWORK MSG: You have replied UNSTOP and will begin receiving messages again from this number.
BWFBP129ONLY USE A SINGLE NUMBER FOR CAMPAIGNS Dont spread your campaigns over several numbers. Using a single number for both text and voice calls is not only a best practice but also a better overall user experience. Your customers can call and text the same number. But more importantly, you should avoid spreading messages across many source phone numbers, specifically to dilute reputation metrics and evade filters. This is referred to as snowshoeing and can result in your content being blocked. If your messaging use case requires the use of multiple numbers to distribute similar or like content, please discuss it with your Bandwidth rep (or other carrier rep).
BWFBP130IDENTIFY YOUR BRAND Include your company name in the messages you send. Your application, service, or business name should be included in the content of the body of your message(s). Example: : You have an appointment for Tuesday, 3:00PM. Reply YES to confirm, NO to reschedule. Reply STOP to unsubscribe.
BWFBP131USE A SINGLE DOMAIN FOR URLS IN YOUR MESSAGES Any campaign URLs should be from a single, specific domain. Each campaign should be associated with a single web domain owned by you, the customer. Although a full domain is preferred, a URL shortener may be used to deliver custom links.

Table4

BWFBP132Back-up your systems fully and often In the event a system is compromised, you can restore it from a known clean backup. Although you may lose some amount of data, youll be able to restore your critical systems.
BWFBP133Review and utilize traffic data By collecting and graphing call logs and Call Detail Records (CDRs) from your VoIP platform, you can see incoming and outgoing calls, and determine if any of the graphed traffic behaviors match or conflict with your business model and service offerings. Monitor and review your LD usage on a regular schedule, or as often as practical.
BWFBP134Secure your Voicemail (VM) Systems Implement strong PIN and VM password policies. Disconnect/disable outbound calling or call-through functionality within the voicemail system. Never allow call forwarding or return call features within a voicemail system. Hackers often exploit voicemail platforms to program fraudulent outbound calling.
BWFBP135PBX management Keep IP-PBX and voice platform operating systems up-to-date Be sure your systems are updated with the latest releases and security patches. Hackers often exploit outdated and unpatched operating systems. Please remain vigilant about maintaining and enhancing your security.
BWFBP136Consider adding time of day/day of week call handling Turn off/disable outdial features (allow inbound calls and 911 only) during non-business hours. At a minimum, restrict international dialing to core business hours only
BWFBP137Set-up a SIP-based firewall within your IP/PBX systems A SIP-based firewall can inspect voice and data packets as they pass through your network, and only allow whats authorized between your platform and your service provider. Firewalls can also alert you when various thresholds or unauthorized access attempts occur. Monitor SIP traffic and automatically block suspicious IP addresses that are SIP scanning the equipment for access. Monitor and alert on all registration events into your PBX, IP PBX, and Call Manager, including failed attempts. Blacklist foreign IPs you dont recognize/do business with. Utilize strong Access Control Lists designed to allow for secure communications while preventing unauthorized access.
BWFBP138Disable DISA (Direct Inward System Access) Prevent external callers from accessing internal PBX features by disabling DISA. Delete unassigned voice mailboxes and associated DISA codes. Consider two-factor authentication for any remote access and/or administrative users
BWFBP139Disable ALL IP ports not currently in use On Linux based IP-PBX systems and ancillary platforms, like voicemail systems, disable all IP ports that arent being used or needed. Hackers look for unused IP ports that can be exploited to gain unauthorized access. Pay special attention to IP ports 5060 and 5080 on IP-PBXs, like Asterisk, Mitel, Polycom, Cisco, and Avaya.
BWFBP140Utilize enterprise-grade Session Border Controllers (SBCs) Enterprise-grade SBCs will provide an added layer of security, which is especially important if you use Unified Communications (UC) services, like video conferencing. Hackers will quite often ping the IP address of an IP-PBX. However, with an SBC in place, theyll get a response from the SBC, not the IP-PBX, and wont gain access or visibility into your IP-PBX. Hackers most always seek the path of least resistance. If they encounter an IP address thats protected, theyll move on to IP addresses that arent. Enterprise-grade SBCs also provide additional layers of protection by allowing operator-configured rules to be executed based on authorized calling patterns and services offered. Enterprises can configure SBC rules for geographic restrictions, number of calls per hour, time of day and days of the week. This can be very effective in preventing robocalls, toll fraud, international fraud, and suspicious calling behaviors during nights or weekends when employees arent typically in the office.

Table5

BWFBP141Improve security through rate limiting login attempts Never allow unlimited login attempts. Enable system lock-out functionality on all voice-processing and voicemail systems that only allow a finite number of attempts, typically three, to enter a password before being locked out. Consider using multi-factor authentication for enhanced security.
BWFBP142Monitor for and block account scanners Look for unauthorized user agents (UAs) like User-Agent: friendly-scanner or UAs that are free and/or dont match your authorized users systems. In a VoIP network environment, numerous unauthorized registration/attempts should be a significant red flag that your network and systems are being probed/scanned for vulnerabilities.
BWFBP143Block/filter traffic from suspicious IP addresses You should filter, block or blacklist suspicious IP addresses (especially in high-risk countries), as theyre identified, so no traffic is allowed to enter your network from them.
BWFBP144Monitor for and disable or remove fake accounts and account sign-ups Look for random email addresses (i.e., slijcg@emaildomain.com) or addresses and ZIP codes that dont align. Its not recommended to solely rely on third-party platforms or application stores to validate your new account sign-ups. If you already use third-party platforms or application stores for account validations and sign-ups, please reach out to your Bandwidth Support Team confirming their current practices leverage security features that will monitor and alert you to fraudulent activities.
BWFBP145Install security software applications on all of your voice processing systems Most security products can flag and reduce the rate of incorrect authentication attempts. They can check for login and VoIP/SIP registration errors and stop brute force attacks against root passwords, injections of malicious traffic, and registration attempts of unauthorized peers with suspicious credentials.

Table6

BWFBP100Make sure all of your voice calling traffic contains good/valid telephone numbers in the ANI/FROM fields. See the definitions of the various types of ANI/FROM fields below. Ensure that all of your calls toward Bandwidth meet the following VALID criteria. VALID : A valid NPA-NXX-XXXX in the NANP UNALLOCATED : A valid NPA NXX XXXX in the NANP, but NOT assigned either to a carrieror in the LERG INVALID NUMBER : A complete telephone number (TN) that is NOT VALID, but of the correct format (i.e. 10 digits in length, 1st and 4th are all others are ) INVALID DIGITS : The calling party number is numeric, but doesnt fit into a category defined above (all 1's, partial entry <10 digits, etc.) 8YY : The calling party number is an 8YY number 911 : The calling party number is 911 411 : The calling party number is 411 N11 : The calling party number is any of N11 number besides 911 or 411 555: The NXX is 555 ALPHA : The calling party number has 'alpha' characters that are random or the word ANONYMOUS in it EMPTY : Theres no calling party number present
BWFBP101Make sure that calls from your network or from your customers never have ANI/FROM phone numbers that fall into the UNALLOCATED, INVALID, N11, Alpha or Empty ANI categories. Please be aware that if any of these types of calls leave your network and are sent toward Bandwidth, you run the risk of these calls being BLOCKED by Bandwidth or another downstream service provider.
BWFBP102Review your customer use cases and discourage short-duration (<15 seconds) calling. Short duration calls raise flags on most service provider networks and may lead to Call Blocking per the FCC guidelines.
BWFBP103If you receive voice traffic that falls into the FCCs unlawful categories , please take measures to detect, mitigate, block, and educate your customers to cease sending these types of calls.

Table7

BWFBP100Make sure all of your voice calling traffic contains good/valid telephone numbers in the ANI/FROM fields. See the definitions of the various types of ANI/FROM fields below. Ensure that all of your calls toward Bandwidth meet the following VALID criteria. VALID : A valid NPA-NXX-XXXX in the NANP UNALLOCATED : A valid NPA NXX XXXX in the NANP, but NOT assigned either to a carrieror in the LERG INVALID NUMBER : A complete telephone number (TN) that is NOT VALID, but of the correct format (i.e. 10 digits in length, 1st and 4th are all others are ) INVALID DIGITS : The calling party number is numeric, but doesnt fit into a category defined above (all 1's, partial entry <10 digits, etc.) 8YY : The calling party number is an 8YY number 911 : The calling party number is 911 411 : The calling party number is 411 N11 : The calling party number is any of N11 number besides 911 or 411 555: The NXX is 555 ALPHA : The calling party number has 'alpha' characters that are random or the word ANONYMOUS in it EMPTY : Theres no calling party number present
BWFBP101Make sure that calls from your network or from your customers never have ANI/FROM phone numbers that fall into the UNALLOCATED, INVALID, N11, Alpha or Empty ANI categories. Please be aware that if any of these types of calls leave your network and are sent toward Bandwidth, you run the risk of these calls being BLOCKED by Bandwidth or another downstream service provider.
BWFBP102Review your customer use cases and discourage short-duration (<15 seconds) calling. Short duration calls raise flags on most service provider networks and may lead to Call Blocking per the FCC guidelines.
BWFBP103If you receive voice traffic that falls into the FCCs unlawful categories , please take measures to detect, mitigate, block, and educate your customers to cease sending these types of calls.

Table8

BWFBP104Set up detection alarms on yours and your customers traffic to alert you on numerous, robotically dialed calls made to known high-cost areas of North America. These areas include but arent limited to rural Iowa, rural South Dakota, and rural Massachusetts. Look at the NPAs, compare the rates within your typical rate decks, and either convince your customers to stop sending this kind of traffic to you, or block this kind of traffic from terversing your network. Bandwidth may also be monitoring for this type of traffic and typically alerts its customers upon detection.
BWFBP105Educate your customers on this type of fraud and encourage them to prevent, detect, and mitigate such fraudulent Domestic Toll Fraud traffic before it reaches your network.

Table9

BWFBP104Set up detection alarms on yours and your customers traffic to alert you on numerous, robotically dialed calls made to known high-cost areas of North America. These areas include but arent limited to rural Iowa, rural South Dakota, and rural Massachusetts. Look at the NPAs, compare the rates within your typical rate decks, and either convince your customers to stop sending this kind of traffic to you, or block this kind of traffic from terversing your network. Bandwidth may also be monitoring for this type of traffic and typically alerts its customers upon detection.
BWFBP105Educate your customers on this type of fraud and encourage them to prevent, detect, and mitigate such fraudulent Domestic Toll Fraud traffic before it reaches your network.
* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions

The One-Ring Scam

Table

BWFBP100Make sure all of your voice calling traffic contains good/valid telephone numbers in the ANI/FROM fields. See the definitions of the various types of ANI/FROM fields below. Ensure that all of your calls toward Bandwidth meet the following VALID criteria. VALID : A valid NPA-NXX-XXXX in the NANP UNALLOCATED : A valid NPA NXX XXXX in the NANP, but NOT assigned either to a carrieror in the LERG INVALID NUMBER : A complete telephone number (TN) that is NOT VALID, but of the correct format (i.e. 10 digits in length, 1st and 4th are all others are ) INVALID DIGITS : The calling party number is numeric, but doesnt fit into a category defined above (all 1's, partial entry <10 digits, etc.) 8YY : The calling party number is an 8YY number 911 : The calling party number is 911 411 : The calling party number is 411 N11 : The calling party number is any of N11 number besides 911 or 411 555: The NXX is 555 ALPHA : The calling party number has 'alpha' characters that are random or the word ANONYMOUS in it EMPTY : Theres no calling party number present
BWFBP101Make sure that calls from your network or from your customers never have ANI/FROM phone numbers that fall into the UNALLOCATED, INVALID, N11, Alpha or Empty ANI categories. Please be aware that if any of these types of calls leave your network and are sent toward Bandwidth, you run the risk of these calls being BLOCKED by Bandwidth or another downstream service provider.
BWFBP102Review your customer use cases and discourage short-duration (<15 seconds) calling. Short duration calls raise flags on most service provider networks and may lead to Call Blocking per the FCC guidelines.
BWFBP103If you receive voice traffic that falls into the FCCs unlawful categories , please take measures to detect, mitigate, block, and educate your customers to cease sending these types of calls.

The Better Business Bureau is warning people to watch out for one ring phone scam that is hitting several states. One ring scam targets specific area codes in bursts, sometimes calling the same number several times overnight. If you CALL back these unknown callers, you may get per minute toll charges. The Federal Communications Commission SAY scammers are using the '222' country code of Mauritania, which is in West Africa. Usually, robocaller will CALL and hang up after one or two rings. It may do this several times, in hopes that someone will CALL back and run up the toll that is paid to scammer. It is human nature to be annoy enough, and curious enough, about the origin of middle-of-night caller that you might CALL it back to see who it is, SAY Heather Clary, Director of Communications for BBB serving Central & Eastern Kentucky. However, in this case, that could be an expensive decision. BBB SAY no reports of these calls have happened in Central or Eastern Kentucky, but it wants the public to be aware. Here are some tips If you get one of these calls:-don't CALL back numbers you do not know, especially if they look like they are from overseas.-If you get one of these calls, file a Complaint at www. FCC. Gov / complaints and at www. BBB. Org / scamtracker.-If you NEVER make international calls, you can ask your phone company to block outbound international calls to prevent accidental toll CALL.-Keep close eye on your phone bill for unexpected charges.

* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions.

Table10

BWFBP106Consider MANDATING the use of an authorization code, or PIN, that must be used by customers, employees, and end-users before placing international calls.
BWFBP107As end-users attempt to make international calls through your network, ensure that their account code, authorization code, or PIN is accurately and securely VERIFIED before they are allowed to make international calls.
BWFBP108Determine which countries, your platform specifically supports calling to, and then restrict calling to all the remaining countries. Limit international dialing to only authorized customers, employees, and end-users who require it. Restrict all others.
BWFBP109Consider blocking the following frequently Fraudulent countries in your systems, your network and in your customers systems: AC Ascension Islands 247 AG Antigua/Barbuda 268 AI Anguilla 264 AS American Samoa 684 BB Barbados 246 BM Bermuda 441 BS Bahamas 242 CD Democratic Republic of the Congo 243 CF Central African Republic 236 CG Congo 242 CZ Czech Republic 240 DM Dominica 767 DO Dominican Republic 809 829 849 GD Grenada 473 GQ Equatorial Guinea 240 GU Guam 671 HT Haiti 509 JM Jamaica 876 KN St. Kitts Nevis 869 KY Cayman Islands 345 LC St. Lucia 758 LT Lithuania 370 MA Morocco 212 MF St Martin 590 MP Northern Mariana Islands 670 MS Montserrat 664 MV Maldives 960 PK Pakistan 92 PW Palau 680 SC Seychelles 248 SX Sint Maarten 721 TC Turks and Caicos Islands 649 TD Chad 235 TN Tunisia 216 TT Trinidad and Tobago 868 UG Uganda 256 VC Saint Vincent and the Grenadines 784 VG British Virgin Islands 284 VI U.S. Virgin Islands 340 SL Sierra Leone 232 SD Sudan 249 LR Liberia 231 LV Latvia 371
BWFBP110Look for large volumes of SIP 487 response codes in short periods of time on your network. Using something known as Hyper-duration robocalls, bad actors typically probe networks looking for cracks in the network that will allow completed international calls. During these hyper-duration storms, bad actors typically launch large volumes of SIP INVITE messages in a short period of time (thousands of INVITE messages within 5 mins or less), followed very rapidly by SIP HANGUP (487) messages. Its important to note that call attempts that dont complete, dont necessarily equal unsuccessful calls. All rapid-fire attempts/hangups in a short period of time should be considered a red flag for possible fraudulent activities in the near future. When you see more than an average of about 60 SIP 487 messages per hour, look at your traffic for fraudulent activity and calls to fraudulent destinations. If you discover suspicious/fraudulent behaviors, take measures to block/prevent future attempts of these types of international calls from reaching Bandwidth.
BWFBP111Ensure that passwords to your companys network equipment are unique to each unit of equipment, contain random characters, made random in length, and are NOT the passwords that were pre-configured at the time of purchase/installation. These passwords must be changed often and only shared with personnel authorized to make changes to your network equipment. Zero-knowledge password managers are highly recommended.

Table11

BWFBP106Consider MANDATING the use of an authorization code, or PIN, that must be used by customers, employees, and end-users before placing international calls.
BWFBP107As end-users attempt to make international calls through your network, ensure that their account code, authorization code, or PIN is accurately and securely VERIFIED before they are allowed to make international calls.
BWFBP108Determine which countries, your platform specifically supports calling to, and then restrict calling to all the remaining countries. Limit international dialing to only authorized customers, employees, and end-users who require it. Restrict all others.
BWFBP109Consider blocking the following frequently Fraudulent countries in your systems, your network and in your customers systems: AC Ascension Islands 247 AG Antigua/Barbuda 268 AI Anguilla 264 AS American Samoa 684 BB Barbados 246 BM Bermuda 441 BS Bahamas 242 CD Democratic Republic of the Congo 243 CF Central African Republic 236 CG Congo 242 CZ Czech Republic 240 DM Dominica 767 DO Dominican Republic 809 829 849 GD Grenada 473 GQ Equatorial Guinea 240 GU Guam 671 HT Haiti 509 JM Jamaica 876 KN St. Kitts Nevis 869 KY Cayman Islands 345 LC St. Lucia 758 LT Lithuania 370 MA Morocco 212 MF St Martin 590 MP Northern Mariana Islands 670 MS Montserrat 664 MV Maldives 960 PK Pakistan 92 PW Palau 680 SC Seychelles 248 SX Sint Maarten 721 TC Turks and Caicos Islands 649 TD Chad 235 TN Tunisia 216 TT Trinidad and Tobago 868 UG Uganda 256 VC Saint Vincent and the Grenadines 784 VG British Virgin Islands 284 VI U.S. Virgin Islands 340 SL Sierra Leone 232 SD Sudan 249 LR Liberia 231 LV Latvia 371
BWFBP110Look for large volumes of SIP 487 response codes in short periods of time on your network. Using something known as Hyper-duration robocalls, bad actors typically probe networks looking for cracks in the network that will allow completed international calls. During these hyper-duration storms, bad actors typically launch large volumes of SIP INVITE messages in a short period of time (thousands of INVITE messages within 5 mins or less), followed very rapidly by SIP HANGUP (487) messages. Its important to note that call attempts that dont complete, dont necessarily equal unsuccessful calls. All rapid-fire attempts/hangups in a short period of time should be considered a red flag for possible fraudulent activities in the near future. When you see more than an average of about 60 SIP 487 messages per hour, look at your traffic for fraudulent activity and calls to fraudulent destinations. If you discover suspicious/fraudulent behaviors, take measures to block/prevent future attempts of these types of international calls from reaching Bandwidth.
BWFBP111Ensure that passwords to your companys network equipment are unique to each unit of equipment, contain random characters, made random in length, and are NOT the passwords that were pre-configured at the time of purchase/installation. These passwords must be changed often and only shared with personnel authorized to make changes to your network equipment. Zero-knowledge password managers are highly recommended.

Table12

BWFBP118Use data analytics to map customers sign-up information with valid/legitimate addresses, credit card accounts, email addresses, and phone numbers. Keep track of suspicious sign-ups and immediately disable/disconnect fraudulent accounts as they become known.
BWFBP119If phone numbers are disconnected because they were found to be used in a fraudulent manner to perpetrate a phishing scam, DONT auto-provision phone numbers to the same account.
BWFBP120Sometimes bad actors use call-forwarding to evade detection. Oftentimes, they use multiple call forwarding layers to evade detection. If your network or service offering includes a call-forwarding function, be aware of customers who enter large numbers of entries in your call forwarding tables, especially through web page interfaces. Please send all call-forwarding tables/forwarding information that contain Bandwidth phone numbers to voicesecurity@bandwidth.com .
BWFBP121Keep an eye out for accounts that use numerous phone numbers across a large geographic area. Please report all accounts, and account information, that have numerous phone numbers across large geographic areas to voicesecurity@bandwidth.com .
BWFBP122Monitor for and be aware of end users who cycle through phone numbers at higher than normal rates, volumes, and frequencies. This rapid phone number swapping behavior could indicate that they're trying to avoid detection by carriers, law enforcement, and government agencies. The perpetrators of the IRS and Social Security scam calls will typically swap phone numbers at unusual rates to cover their tracks after initial calls are placed and received.

Table13

BWFBP118Use data analytics to map customers sign-up information with valid/legitimate addresses, credit card accounts, email addresses, and phone numbers. Keep track of suspicious sign-ups and immediately disable/disconnect fraudulent accounts as they become known.
BWFBP119If phone numbers are disconnected because they were found to be used in a fraudulent manner to perpetrate a phishing scam, DONT auto-provision phone numbers to the same account.
BWFBP120Sometimes bad actors use call-forwarding to evade detection. Oftentimes, they use multiple call forwarding layers to evade detection. If your network or service offering includes a call-forwarding function, be aware of customers who enter large numbers of entries in your call forwarding tables, especially through web page interfaces. Please send all call-forwarding tables/forwarding information that contain Bandwidth phone numbers to voicesecurity@bandwidth.com .
BWFBP121Keep an eye out for accounts that use numerous phone numbers across a large geographic area. Please report all accounts, and account information, that have numerous phone numbers across large geographic areas to voicesecurity@bandwidth.com .
BWFBP122Monitor for and be aware of end users who cycle through phone numbers at higher than normal rates, volumes, and frequencies. This rapid phone number swapping behavior could indicate that they're trying to avoid detection by carriers, law enforcement, and government agencies. The perpetrators of the IRS and Social Security scam calls will typically swap phone numbers at unusual rates to cover their tracks after initial calls are placed and received.

Table7

BWFBP100Make sure all of your voice calling traffic contains good/valid telephone numbers in the ANI/FROM fields. See the definitions of the various types of ANI/FROM fields below. Ensure that all of your calls toward Bandwidth meet the following VALID criteria. VALID : A valid NPA-NXX-XXXX in the NANP UNALLOCATED : A valid NPA NXX XXXX in the NANP, but NOT assigned either to a carrieror in the LERG INVALID NUMBER : A complete telephone number (TN) that is NOT VALID, but of the correct format (i.e. 10 digits in length, 1st and 4th are all others are ) INVALID DIGITS : The calling party number is numeric, but doesnt fit into a category defined above (all 1's, partial entry <10 digits, etc.) 8YY : The calling party number is an 8YY number 911 : The calling party number is 911 411 : The calling party number is 411 N11 : The calling party number is any of N11 number besides 911 or 411 555: The NXX is 555 ALPHA : The calling party number has 'alpha' characters that are random or the word ANONYMOUS in it EMPTY : Theres no calling party number present
BWFBP101Make sure that calls from your network or from your customers never have ANI/FROM phone numbers that fall into the UNALLOCATED, INVALID, N11, Alpha or Empty ANI categories. Please be aware that if any of these types of calls leave your network and are sent toward Bandwidth, you run the risk of these calls being BLOCKED by Bandwidth or another downstream service provider.
BWFBP102Review your customer use cases and discourage short-duration (<15 seconds) calling. Short duration calls raise flags on most service provider networks and may lead to Call Blocking per the FCC guidelines.
BWFBP103If you receive voice traffic that falls into the FCCs unlawful categories , please take measures to detect, mitigate, block, and educate your customers to cease sending these types of calls.

Table8

BWFBP104Set up detection alarms on yours and your customers traffic to alert you on numerous, robotically dialed calls made to known high-cost areas of North America. These areas include but arent limited to rural Iowa, rural South Dakota, and rural Massachusetts. Look at the NPAs, compare the rates within your typical rate decks, and either convince your customers to stop sending this kind of traffic to you, or block this kind of traffic from terversing your network. Bandwidth may also be monitoring for this type of traffic and typically alerts its customers upon detection.
BWFBP105Educate your customers on this type of fraud and encourage them to prevent, detect, and mitigate such fraudulent Domestic Toll Fraud traffic before it reaches your network.

Table9

BWFBP104Set up detection alarms on yours and your customers traffic to alert you on numerous, robotically dialed calls made to known high-cost areas of North America. These areas include but arent limited to rural Iowa, rural South Dakota, and rural Massachusetts. Look at the NPAs, compare the rates within your typical rate decks, and either convince your customers to stop sending this kind of traffic to you, or block this kind of traffic from terversing your network. Bandwidth may also be monitoring for this type of traffic and typically alerts its customers upon detection.
BWFBP105Educate your customers on this type of fraud and encourage them to prevent, detect, and mitigate such fraudulent Domestic Toll Fraud traffic before it reaches your network.
* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions

How to Stop Robocalls

Table

CarrierProductPrice
ATTCall ProtectFree
T-MobileScam Shield, Scam Shield PremiumRanges from free to $4/month
VerizonCall Filter, Premium Call FilterRanges from free to $2.99/month

* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions.

Table10

BWFBP106Consider MANDATING the use of an authorization code, or PIN, that must be used by customers, employees, and end-users before placing international calls.
BWFBP107As end-users attempt to make international calls through your network, ensure that their account code, authorization code, or PIN is accurately and securely VERIFIED before they are allowed to make international calls.
BWFBP108Determine which countries, your platform specifically supports calling to, and then restrict calling to all the remaining countries. Limit international dialing to only authorized customers, employees, and end-users who require it. Restrict all others.
BWFBP109Consider blocking the following frequently Fraudulent countries in your systems, your network and in your customers systems: AC Ascension Islands 247 AG Antigua/Barbuda 268 AI Anguilla 264 AS American Samoa 684 BB Barbados 246 BM Bermuda 441 BS Bahamas 242 CD Democratic Republic of the Congo 243 CF Central African Republic 236 CG Congo 242 CZ Czech Republic 240 DM Dominica 767 DO Dominican Republic 809 829 849 GD Grenada 473 GQ Equatorial Guinea 240 GU Guam 671 HT Haiti 509 JM Jamaica 876 KN St. Kitts Nevis 869 KY Cayman Islands 345 LC St. Lucia 758 LT Lithuania 370 MA Morocco 212 MF St Martin 590 MP Northern Mariana Islands 670 MS Montserrat 664 MV Maldives 960 PK Pakistan 92 PW Palau 680 SC Seychelles 248 SX Sint Maarten 721 TC Turks and Caicos Islands 649 TD Chad 235 TN Tunisia 216 TT Trinidad and Tobago 868 UG Uganda 256 VC Saint Vincent and the Grenadines 784 VG British Virgin Islands 284 VI U.S. Virgin Islands 340 SL Sierra Leone 232 SD Sudan 249 LR Liberia 231 LV Latvia 371
BWFBP110Look for large volumes of SIP 487 response codes in short periods of time on your network. Using something known as Hyper-duration robocalls, bad actors typically probe networks looking for cracks in the network that will allow completed international calls. During these hyper-duration storms, bad actors typically launch large volumes of SIP INVITE messages in a short period of time (thousands of INVITE messages within 5 mins or less), followed very rapidly by SIP HANGUP (487) messages. Its important to note that call attempts that dont complete, dont necessarily equal unsuccessful calls. All rapid-fire attempts/hangups in a short period of time should be considered a red flag for possible fraudulent activities in the near future. When you see more than an average of about 60 SIP 487 messages per hour, look at your traffic for fraudulent activity and calls to fraudulent destinations. If you discover suspicious/fraudulent behaviors, take measures to block/prevent future attempts of these types of international calls from reaching Bandwidth.
BWFBP111Ensure that passwords to your companys network equipment are unique to each unit of equipment, contain random characters, made random in length, and are NOT the passwords that were pre-configured at the time of purchase/installation. These passwords must be changed often and only shared with personnel authorized to make changes to your network equipment. Zero-knowledge password managers are highly recommended.

Table11

BWFBP106Consider MANDATING the use of an authorization code, or PIN, that must be used by customers, employees, and end-users before placing international calls.
BWFBP107As end-users attempt to make international calls through your network, ensure that their account code, authorization code, or PIN is accurately and securely VERIFIED before they are allowed to make international calls.
BWFBP108Determine which countries, your platform specifically supports calling to, and then restrict calling to all the remaining countries. Limit international dialing to only authorized customers, employees, and end-users who require it. Restrict all others.
BWFBP109Consider blocking the following frequently Fraudulent countries in your systems, your network and in your customers systems: AC Ascension Islands 247 AG Antigua/Barbuda 268 AI Anguilla 264 AS American Samoa 684 BB Barbados 246 BM Bermuda 441 BS Bahamas 242 CD Democratic Republic of the Congo 243 CF Central African Republic 236 CG Congo 242 CZ Czech Republic 240 DM Dominica 767 DO Dominican Republic 809 829 849 GD Grenada 473 GQ Equatorial Guinea 240 GU Guam 671 HT Haiti 509 JM Jamaica 876 KN St. Kitts Nevis 869 KY Cayman Islands 345 LC St. Lucia 758 LT Lithuania 370 MA Morocco 212 MF St Martin 590 MP Northern Mariana Islands 670 MS Montserrat 664 MV Maldives 960 PK Pakistan 92 PW Palau 680 SC Seychelles 248 SX Sint Maarten 721 TC Turks and Caicos Islands 649 TD Chad 235 TN Tunisia 216 TT Trinidad and Tobago 868 UG Uganda 256 VC Saint Vincent and the Grenadines 784 VG British Virgin Islands 284 VI U.S. Virgin Islands 340 SL Sierra Leone 232 SD Sudan 249 LR Liberia 231 LV Latvia 371
BWFBP110Look for large volumes of SIP 487 response codes in short periods of time on your network. Using something known as Hyper-duration robocalls, bad actors typically probe networks looking for cracks in the network that will allow completed international calls. During these hyper-duration storms, bad actors typically launch large volumes of SIP INVITE messages in a short period of time (thousands of INVITE messages within 5 mins or less), followed very rapidly by SIP HANGUP (487) messages. Its important to note that call attempts that dont complete, dont necessarily equal unsuccessful calls. All rapid-fire attempts/hangups in a short period of time should be considered a red flag for possible fraudulent activities in the near future. When you see more than an average of about 60 SIP 487 messages per hour, look at your traffic for fraudulent activity and calls to fraudulent destinations. If you discover suspicious/fraudulent behaviors, take measures to block/prevent future attempts of these types of international calls from reaching Bandwidth.
BWFBP111Ensure that passwords to your companys network equipment are unique to each unit of equipment, contain random characters, made random in length, and are NOT the passwords that were pre-configured at the time of purchase/installation. These passwords must be changed often and only shared with personnel authorized to make changes to your network equipment. Zero-knowledge password managers are highly recommended.

Table12

BWFBP118Use data analytics to map customers sign-up information with valid/legitimate addresses, credit card accounts, email addresses, and phone numbers. Keep track of suspicious sign-ups and immediately disable/disconnect fraudulent accounts as they become known.
BWFBP119If phone numbers are disconnected because they were found to be used in a fraudulent manner to perpetrate a phishing scam, DONT auto-provision phone numbers to the same account.
BWFBP120Sometimes bad actors use call-forwarding to evade detection. Oftentimes, they use multiple call forwarding layers to evade detection. If your network or service offering includes a call-forwarding function, be aware of customers who enter large numbers of entries in your call forwarding tables, especially through web page interfaces. Please send all call-forwarding tables/forwarding information that contain Bandwidth phone numbers to voicesecurity@bandwidth.com .
BWFBP121Keep an eye out for accounts that use numerous phone numbers across a large geographic area. Please report all accounts, and account information, that have numerous phone numbers across large geographic areas to voicesecurity@bandwidth.com .
BWFBP122Monitor for and be aware of end users who cycle through phone numbers at higher than normal rates, volumes, and frequencies. This rapid phone number swapping behavior could indicate that they're trying to avoid detection by carriers, law enforcement, and government agencies. The perpetrators of the IRS and Social Security scam calls will typically swap phone numbers at unusual rates to cover their tracks after initial calls are placed and received.

Table13

BWFBP118Use data analytics to map customers sign-up information with valid/legitimate addresses, credit card accounts, email addresses, and phone numbers. Keep track of suspicious sign-ups and immediately disable/disconnect fraudulent accounts as they become known.
BWFBP119If phone numbers are disconnected because they were found to be used in a fraudulent manner to perpetrate a phishing scam, DONT auto-provision phone numbers to the same account.
BWFBP120Sometimes bad actors use call-forwarding to evade detection. Oftentimes, they use multiple call forwarding layers to evade detection. If your network or service offering includes a call-forwarding function, be aware of customers who enter large numbers of entries in your call forwarding tables, especially through web page interfaces. Please send all call-forwarding tables/forwarding information that contain Bandwidth phone numbers to voicesecurity@bandwidth.com .
BWFBP121Keep an eye out for accounts that use numerous phone numbers across a large geographic area. Please report all accounts, and account information, that have numerous phone numbers across large geographic areas to voicesecurity@bandwidth.com .
BWFBP122Monitor for and be aware of end users who cycle through phone numbers at higher than normal rates, volumes, and frequencies. This rapid phone number swapping behavior could indicate that they're trying to avoid detection by carriers, law enforcement, and government agencies. The perpetrators of the IRS and Social Security scam calls will typically swap phone numbers at unusual rates to cover their tracks after initial calls are placed and received.

Table6

BWFBP100Make sure all of your voice calling traffic contains good/valid telephone numbers in the ANI/FROM fields. See the definitions of the various types of ANI/FROM fields below. Ensure that all of your calls toward Bandwidth meet the following VALID criteria. VALID : A valid NPA-NXX-XXXX in the NANP UNALLOCATED : A valid NPA NXX XXXX in the NANP, but NOT assigned either to a carrieror in the LERG INVALID NUMBER : A complete telephone number (TN) that is NOT VALID, but of the correct format (i.e. 10 digits in length, 1st and 4th are all others are ) INVALID DIGITS : The calling party number is numeric, but doesnt fit into a category defined above (all 1's, partial entry <10 digits, etc.) 8YY : The calling party number is an 8YY number 911 : The calling party number is 911 411 : The calling party number is 411 N11 : The calling party number is any of N11 number besides 911 or 411 555: The NXX is 555 ALPHA : The calling party number has 'alpha' characters that are random or the word ANONYMOUS in it EMPTY : Theres no calling party number present
BWFBP101Make sure that calls from your network or from your customers never have ANI/FROM phone numbers that fall into the UNALLOCATED, INVALID, N11, Alpha or Empty ANI categories. Please be aware that if any of these types of calls leave your network and are sent toward Bandwidth, you run the risk of these calls being BLOCKED by Bandwidth or another downstream service provider.
BWFBP102Review your customer use cases and discourage short-duration (<15 seconds) calling. Short duration calls raise flags on most service provider networks and may lead to Call Blocking per the FCC guidelines.
BWFBP103If you receive voice traffic that falls into the FCCs unlawful categories , please take measures to detect, mitigate, block, and educate your customers to cease sending these types of calls.

Table7

BWFBP100Make sure all of your voice calling traffic contains good/valid telephone numbers in the ANI/FROM fields. See the definitions of the various types of ANI/FROM fields below. Ensure that all of your calls toward Bandwidth meet the following VALID criteria. VALID : A valid NPA-NXX-XXXX in the NANP UNALLOCATED : A valid NPA NXX XXXX in the NANP, but NOT assigned either to a carrieror in the LERG INVALID NUMBER : A complete telephone number (TN) that is NOT VALID, but of the correct format (i.e. 10 digits in length, 1st and 4th are all others are ) INVALID DIGITS : The calling party number is numeric, but doesnt fit into a category defined above (all 1's, partial entry <10 digits, etc.) 8YY : The calling party number is an 8YY number 911 : The calling party number is 911 411 : The calling party number is 411 N11 : The calling party number is any of N11 number besides 911 or 411 555: The NXX is 555 ALPHA : The calling party number has 'alpha' characters that are random or the word ANONYMOUS in it EMPTY : Theres no calling party number present
BWFBP101Make sure that calls from your network or from your customers never have ANI/FROM phone numbers that fall into the UNALLOCATED, INVALID, N11, Alpha or Empty ANI categories. Please be aware that if any of these types of calls leave your network and are sent toward Bandwidth, you run the risk of these calls being BLOCKED by Bandwidth or another downstream service provider.
BWFBP102Review your customer use cases and discourage short-duration (<15 seconds) calling. Short duration calls raise flags on most service provider networks and may lead to Call Blocking per the FCC guidelines.
BWFBP103If you receive voice traffic that falls into the FCCs unlawful categories , please take measures to detect, mitigate, block, and educate your customers to cease sending these types of calls.

Table8

BWFBP104Set up detection alarms on yours and your customers traffic to alert you on numerous, robotically dialed calls made to known high-cost areas of North America. These areas include but arent limited to rural Iowa, rural South Dakota, and rural Massachusetts. Look at the NPAs, compare the rates within your typical rate decks, and either convince your customers to stop sending this kind of traffic to you, or block this kind of traffic from terversing your network. Bandwidth may also be monitoring for this type of traffic and typically alerts its customers upon detection.
BWFBP105Educate your customers on this type of fraud and encourage them to prevent, detect, and mitigate such fraudulent Domestic Toll Fraud traffic before it reaches your network.

Table9

BWFBP104Set up detection alarms on yours and your customers traffic to alert you on numerous, robotically dialed calls made to known high-cost areas of North America. These areas include but arent limited to rural Iowa, rural South Dakota, and rural Massachusetts. Look at the NPAs, compare the rates within your typical rate decks, and either convince your customers to stop sending this kind of traffic to you, or block this kind of traffic from terversing your network. Bandwidth may also be monitoring for this type of traffic and typically alerts its customers upon detection.
BWFBP105Educate your customers on this type of fraud and encourage them to prevent, detect, and mitigate such fraudulent Domestic Toll Fraud traffic before it reaches your network.
* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions

Final Thought

Table

BWFBP100Make sure all of your voice calling traffic contains good/valid telephone numbers in the ANI/FROM fields. See the definitions of the various types of ANI/FROM fields below. Ensure that all of your calls toward Bandwidth meet the following VALID criteria. VALID : A valid NPA-NXX-XXXX in the NANP UNALLOCATED : A valid NPA NXX XXXX in the NANP, but NOT assigned either to a carrieror in the LERG INVALID NUMBER : A complete telephone number (TN) that is NOT VALID, but of the correct format (i.e. 10 digits in length, 1st and 4th are all others are ) INVALID DIGITS : The calling party number is numeric, but doesnt fit into a category defined above (all 1's, partial entry <10 digits, etc.) 8YY : The calling party number is an 8YY number 911 : The calling party number is 911 411 : The calling party number is 411 N11 : The calling party number is any of N11 number besides 911 or 411 555: The NXX is 555 ALPHA : The calling party number has 'alpha' characters that are random or the word ANONYMOUS in it EMPTY : Theres no calling party number present
BWFBP101Make sure that calls from your network or from your customers never have ANI/FROM phone numbers that fall into the UNALLOCATED, INVALID, N11, Alpha or Empty ANI categories. Please be aware that if any of these types of calls leave your network and are sent toward Bandwidth, you run the risk of these calls being BLOCKED by Bandwidth or another downstream service provider.
BWFBP102Review your customer use cases and discourage short-duration (<15 seconds) calling. Short duration calls raise flags on most service provider networks and may lead to Call Blocking per the FCC guidelines.
BWFBP103If you receive voice traffic that falls into the FCCs unlawful categories , please take measures to detect, mitigate, block, and educate your customers to cease sending these types of calls.

Rumors are circulating about scam area codes: If you call numbers with these prefixes, story go, youll be charged thousands of dollars. That is not true, Better Business Bureau say, although there are real risks of being ripped off. It describe scam like this: these area codes are for phone numbers in the Caribbean. 809 are in the Dominican Republic, 284 are the British Virgin Islands, 649 are the Turks and Caicos Islands, and 876 is Jamaica. There is nothing inherently wrong with calling them, as long as you know people in those areas or recognize them as area codes outside the US. One advantage for scammers operating from those area codes is that sometimes calls between neighboring countries do not require the usual 011 international prefix, BBB say. So American callers may not realize numbers are from outside the country, even though international charges will apply. Rumor-investigating Snopes. Com note that people have been warning each other about this scam through email and other means since AT least 2000, and over time suppose the cost of calls keeps increasing to the point that readers are now warned they may be charged MORE than 2 400 per minute if they fall for this scam! In fact, it would probably cost about 25, Snopes say, and phone providers will likely remove it if you give them a call. AT & T, in warning about the 809 area code, said it will work with you and the carrier to help remove fraudulent charges from phone bill. The real risk is in giving scammers money or personal information. AARP recently warned about area code 876 in particular, noting that scams there usually involve winning the Jamaican lottery or NEW car. They require you to send processing fee for your winnings, through wire from Western Union, Green Dot Card or in creative way such as putting 100 bills on each page of magazine.

* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions.

Table10

BWFBP106Consider MANDATING the use of an authorization code, or PIN, that must be used by customers, employees, and end-users before placing international calls.
BWFBP107As end-users attempt to make international calls through your network, ensure that their account code, authorization code, or PIN is accurately and securely VERIFIED before they are allowed to make international calls.
BWFBP108Determine which countries, your platform specifically supports calling to, and then restrict calling to all the remaining countries. Limit international dialing to only authorized customers, employees, and end-users who require it. Restrict all others.
BWFBP109Consider blocking the following frequently Fraudulent countries in your systems, your network and in your customers systems: AC Ascension Islands 247 AG Antigua/Barbuda 268 AI Anguilla 264 AS American Samoa 684 BB Barbados 246 BM Bermuda 441 BS Bahamas 242 CD Democratic Republic of the Congo 243 CF Central African Republic 236 CG Congo 242 CZ Czech Republic 240 DM Dominica 767 DO Dominican Republic 809 829 849 GD Grenada 473 GQ Equatorial Guinea 240 GU Guam 671 HT Haiti 509 JM Jamaica 876 KN St. Kitts Nevis 869 KY Cayman Islands 345 LC St. Lucia 758 LT Lithuania 370 MA Morocco 212 MF St Martin 590 MP Northern Mariana Islands 670 MS Montserrat 664 MV Maldives 960 PK Pakistan 92 PW Palau 680 SC Seychelles 248 SX Sint Maarten 721 TC Turks and Caicos Islands 649 TD Chad 235 TN Tunisia 216 TT Trinidad and Tobago 868 UG Uganda 256 VC Saint Vincent and the Grenadines 784 VG British Virgin Islands 284 VI U.S. Virgin Islands 340 SL Sierra Leone 232 SD Sudan 249 LR Liberia 231 LV Latvia 371
BWFBP110Look for large volumes of SIP 487 response codes in short periods of time on your network. Using something known as Hyper-duration robocalls, bad actors typically probe networks looking for cracks in the network that will allow completed international calls. During these hyper-duration storms, bad actors typically launch large volumes of SIP INVITE messages in a short period of time (thousands of INVITE messages within 5 mins or less), followed very rapidly by SIP HANGUP (487) messages. Its important to note that call attempts that dont complete, dont necessarily equal unsuccessful calls. All rapid-fire attempts/hangups in a short period of time should be considered a red flag for possible fraudulent activities in the near future. When you see more than an average of about 60 SIP 487 messages per hour, look at your traffic for fraudulent activity and calls to fraudulent destinations. If you discover suspicious/fraudulent behaviors, take measures to block/prevent future attempts of these types of international calls from reaching Bandwidth.
BWFBP111Ensure that passwords to your companys network equipment are unique to each unit of equipment, contain random characters, made random in length, and are NOT the passwords that were pre-configured at the time of purchase/installation. These passwords must be changed often and only shared with personnel authorized to make changes to your network equipment. Zero-knowledge password managers are highly recommended.

Table11

BWFBP106Consider MANDATING the use of an authorization code, or PIN, that must be used by customers, employees, and end-users before placing international calls.
BWFBP107As end-users attempt to make international calls through your network, ensure that their account code, authorization code, or PIN is accurately and securely VERIFIED before they are allowed to make international calls.
BWFBP108Determine which countries, your platform specifically supports calling to, and then restrict calling to all the remaining countries. Limit international dialing to only authorized customers, employees, and end-users who require it. Restrict all others.
BWFBP109Consider blocking the following frequently Fraudulent countries in your systems, your network and in your customers systems: AC Ascension Islands 247 AG Antigua/Barbuda 268 AI Anguilla 264 AS American Samoa 684 BB Barbados 246 BM Bermuda 441 BS Bahamas 242 CD Democratic Republic of the Congo 243 CF Central African Republic 236 CG Congo 242 CZ Czech Republic 240 DM Dominica 767 DO Dominican Republic 809 829 849 GD Grenada 473 GQ Equatorial Guinea 240 GU Guam 671 HT Haiti 509 JM Jamaica 876 KN St. Kitts Nevis 869 KY Cayman Islands 345 LC St. Lucia 758 LT Lithuania 370 MA Morocco 212 MF St Martin 590 MP Northern Mariana Islands 670 MS Montserrat 664 MV Maldives 960 PK Pakistan 92 PW Palau 680 SC Seychelles 248 SX Sint Maarten 721 TC Turks and Caicos Islands 649 TD Chad 235 TN Tunisia 216 TT Trinidad and Tobago 868 UG Uganda 256 VC Saint Vincent and the Grenadines 784 VG British Virgin Islands 284 VI U.S. Virgin Islands 340 SL Sierra Leone 232 SD Sudan 249 LR Liberia 231 LV Latvia 371
BWFBP110Look for large volumes of SIP 487 response codes in short periods of time on your network. Using something known as Hyper-duration robocalls, bad actors typically probe networks looking for cracks in the network that will allow completed international calls. During these hyper-duration storms, bad actors typically launch large volumes of SIP INVITE messages in a short period of time (thousands of INVITE messages within 5 mins or less), followed very rapidly by SIP HANGUP (487) messages. Its important to note that call attempts that dont complete, dont necessarily equal unsuccessful calls. All rapid-fire attempts/hangups in a short period of time should be considered a red flag for possible fraudulent activities in the near future. When you see more than an average of about 60 SIP 487 messages per hour, look at your traffic for fraudulent activity and calls to fraudulent destinations. If you discover suspicious/fraudulent behaviors, take measures to block/prevent future attempts of these types of international calls from reaching Bandwidth.
BWFBP111Ensure that passwords to your companys network equipment are unique to each unit of equipment, contain random characters, made random in length, and are NOT the passwords that were pre-configured at the time of purchase/installation. These passwords must be changed often and only shared with personnel authorized to make changes to your network equipment. Zero-knowledge password managers are highly recommended.

Table12

BWFBP118Use data analytics to map customers sign-up information with valid/legitimate addresses, credit card accounts, email addresses, and phone numbers. Keep track of suspicious sign-ups and immediately disable/disconnect fraudulent accounts as they become known.
BWFBP119If phone numbers are disconnected because they were found to be used in a fraudulent manner to perpetrate a phishing scam, DONT auto-provision phone numbers to the same account.
BWFBP120Sometimes bad actors use call-forwarding to evade detection. Oftentimes, they use multiple call forwarding layers to evade detection. If your network or service offering includes a call-forwarding function, be aware of customers who enter large numbers of entries in your call forwarding tables, especially through web page interfaces. Please send all call-forwarding tables/forwarding information that contain Bandwidth phone numbers to voicesecurity@bandwidth.com .
BWFBP121Keep an eye out for accounts that use numerous phone numbers across a large geographic area. Please report all accounts, and account information, that have numerous phone numbers across large geographic areas to voicesecurity@bandwidth.com .
BWFBP122Monitor for and be aware of end users who cycle through phone numbers at higher than normal rates, volumes, and frequencies. This rapid phone number swapping behavior could indicate that they're trying to avoid detection by carriers, law enforcement, and government agencies. The perpetrators of the IRS and Social Security scam calls will typically swap phone numbers at unusual rates to cover their tracks after initial calls are placed and received.

Table13

BWFBP118Use data analytics to map customers sign-up information with valid/legitimate addresses, credit card accounts, email addresses, and phone numbers. Keep track of suspicious sign-ups and immediately disable/disconnect fraudulent accounts as they become known.
BWFBP119If phone numbers are disconnected because they were found to be used in a fraudulent manner to perpetrate a phishing scam, DONT auto-provision phone numbers to the same account.
BWFBP120Sometimes bad actors use call-forwarding to evade detection. Oftentimes, they use multiple call forwarding layers to evade detection. If your network or service offering includes a call-forwarding function, be aware of customers who enter large numbers of entries in your call forwarding tables, especially through web page interfaces. Please send all call-forwarding tables/forwarding information that contain Bandwidth phone numbers to voicesecurity@bandwidth.com .
BWFBP121Keep an eye out for accounts that use numerous phone numbers across a large geographic area. Please report all accounts, and account information, that have numerous phone numbers across large geographic areas to voicesecurity@bandwidth.com .
BWFBP122Monitor for and be aware of end users who cycle through phone numbers at higher than normal rates, volumes, and frequencies. This rapid phone number swapping behavior could indicate that they're trying to avoid detection by carriers, law enforcement, and government agencies. The perpetrators of the IRS and Social Security scam calls will typically swap phone numbers at unusual rates to cover their tracks after initial calls are placed and received.

Table7

BWFBP100Make sure all of your voice calling traffic contains good/valid telephone numbers in the ANI/FROM fields. See the definitions of the various types of ANI/FROM fields below. Ensure that all of your calls toward Bandwidth meet the following VALID criteria. VALID : A valid NPA-NXX-XXXX in the NANP UNALLOCATED : A valid NPA NXX XXXX in the NANP, but NOT assigned either to a carrieror in the LERG INVALID NUMBER : A complete telephone number (TN) that is NOT VALID, but of the correct format (i.e. 10 digits in length, 1st and 4th are all others are ) INVALID DIGITS : The calling party number is numeric, but doesnt fit into a category defined above (all 1's, partial entry <10 digits, etc.) 8YY : The calling party number is an 8YY number 911 : The calling party number is 911 411 : The calling party number is 411 N11 : The calling party number is any of N11 number besides 911 or 411 555: The NXX is 555 ALPHA : The calling party number has 'alpha' characters that are random or the word ANONYMOUS in it EMPTY : Theres no calling party number present
BWFBP101Make sure that calls from your network or from your customers never have ANI/FROM phone numbers that fall into the UNALLOCATED, INVALID, N11, Alpha or Empty ANI categories. Please be aware that if any of these types of calls leave your network and are sent toward Bandwidth, you run the risk of these calls being BLOCKED by Bandwidth or another downstream service provider.
BWFBP102Review your customer use cases and discourage short-duration (<15 seconds) calling. Short duration calls raise flags on most service provider networks and may lead to Call Blocking per the FCC guidelines.
BWFBP103If you receive voice traffic that falls into the FCCs unlawful categories , please take measures to detect, mitigate, block, and educate your customers to cease sending these types of calls.

Table8

BWFBP104Set up detection alarms on yours and your customers traffic to alert you on numerous, robotically dialed calls made to known high-cost areas of North America. These areas include but arent limited to rural Iowa, rural South Dakota, and rural Massachusetts. Look at the NPAs, compare the rates within your typical rate decks, and either convince your customers to stop sending this kind of traffic to you, or block this kind of traffic from terversing your network. Bandwidth may also be monitoring for this type of traffic and typically alerts its customers upon detection.
BWFBP105Educate your customers on this type of fraud and encourage them to prevent, detect, and mitigate such fraudulent Domestic Toll Fraud traffic before it reaches your network.

Table9

BWFBP104Set up detection alarms on yours and your customers traffic to alert you on numerous, robotically dialed calls made to known high-cost areas of North America. These areas include but arent limited to rural Iowa, rural South Dakota, and rural Massachusetts. Look at the NPAs, compare the rates within your typical rate decks, and either convince your customers to stop sending this kind of traffic to you, or block this kind of traffic from terversing your network. Bandwidth may also be monitoring for this type of traffic and typically alerts its customers upon detection.
BWFBP105Educate your customers on this type of fraud and encourage them to prevent, detect, and mitigate such fraudulent Domestic Toll Fraud traffic before it reaches your network.
* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions

Sources

* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions.

* Please keep in mind that all text is machine-generated, we do not bear any responsibility, and you should always get advice from professionals before taking any actions

logo

Plex.page is an Online Knowledge, where all the summaries are written by a machine. We aim to collect all the knowledge the World Wide Web has to offer.

Partners:
Nvidia inception logo

© All rights reserved
2021 made by Algoritmi Vision Inc.

If you believe that any of the summaries on our website lead to misinformation, don't hesitate to contact us. We will immediately review it and remove the summaries if necessary.

If your domain is listed as one of the sources on any summary, you can consider participating in the "Online Knowledge" program, if you want to proceed, please follow these instructions to apply.
However, if you still want us to remove all links leading to your domain from Plex.page and never use your website as a source, please follow these instructions.