Telephony denial-of-service (TDoS) attacks, which affect the availability and readiness of call centers, are hitting critical first-responder facilities, according to the Federal Bureau of Investigation (FBI). A TDoS attack is designed to prevent incoming and outgoing calls, by flooding a target with junk calls. “The objective is to keep the distraction calls active for as long as possible to overwhelm the victim’s telephone system, which may delay or block legitimate calls for service,” according to a recent announcement from the FBI. Worryingly, TDoS attacks have been hitting Public Safety Answering Points (PSAPs), which are call centers responsible for connecting callers to emergency services, such as police, firefighting or ambulance services. “PSAPs represent key infrastructure that enables emergency responders to identify and respond to critical events affecting the public,” according to the FBI. “The resulting increase in time for emergency services to respond may have dire consequences, including loss of life.” The FBI also warned that TDoS attacks could be used in conjunction with a physical attack, when calls to 911 and other emergency numbers would crest. How TDoS Attacks Work TDoS attacks can be manual or automated, according to the FBI. In the case of the former, adversaries typically use social networks to encourage individuals to flood a particular number with a calling campaign. An automated TDoS attack on the other hand uses VoIP software and session…
0 0 govanguard https://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2021-02-22 17:02:002021-02-22 17:02:00TDoS Attacks Take Aim at Emergency Services
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com