The Federal Bureau of Investigation (FBI) has warned of the harsh consequences of telephony denial-of-service (TDoS) attacks and has also provided the steps needed to mitigate their impact.
The FBI published this warning on Wednesday as an IC3 public service announcement and as a Private Industry Notification issued to private sector organizations in coordination with DHS-CISA.
TDoS attacks are manual or automated malicious attempts to render telephone systems unavailable by blocking incoming and outgoing calls, which could have terrible consequences when directed at 911 or similar emergency call center operations.
“The objective is to keep the distraction calls active for as long as possible to overwhelm the victim’s telephone system, which may delay or block legitimate calls for service,” the FBI said.
“The resulting increase in time for emergency services to respond may have dire consequences, including loss of life.”
Threat actors can coordinate such attacks for a wide range of reasons including hacktivism, financial gain, or harassment.
While hacktivists can abuse them to promote their social or political convictions, malicious actors can and have launched TDoS attacks to extort government and private organizations.
Also Read: 10 Practical Benefits of Managed IT Services
They’ve also been used in the past to disrupt emergency services from answering emergency calls for legitimate requests for help.
“The IC3 has become aware of increased coercion tactics used by the subjects, which have created a threat to emergency services across the nation,” the FBI said in a public service announcement from January 2013.
“The threats have now escalated into a Telephony Denial of Service (TDoS) attacks against the victims’ employers, which some have been emergency service agencies.
“The TDoS attacks have tied up the emergency services’ telephone lines, preventing them from receiving and responding to legitimate emergency calls.”
A separate confidential alert sent to public safety answering points (PSAPs) and emergency communications centers and personnel in March 2013 said that “[i]t is speculated that government offices/emergency services are being ‘targeted’ because of the necessity of functional phone lines.”
As the FBI further added in yesterday’s warning, malicious actors provide TDoS services and tools to attackers with varying levels of experience, which drastically lowers the skill level needed to launch such attacks.
TDoS attacks are also challenging to detect, given that attackers spoof the caller ID on every call (in some cases, choosing to spoof the phone numbers of police departments).
This makes it almost impossible to differentiate between malicious and legitimate calls.
FBI’s list of recommendations includes measures to take before TDoS attacks, during them, and information on how to report the attacks to the authorities.
Also Read: Limiting Location Data Exposure: 8 Best Practices
The FBI also shared info on how to prepare for 911 outages: