Spammers Wreak Havoc at AT&T Call Center

According to courthousenews.com,

Several of AT&T’s call centers have been receiving numerous anonymous email spam messages. These email messages were distributed via AT&T’s internal email distribution systems. These phony messages told the call-center employees to go home “in an orderly fashion.” Another message suggested that certain call center locations were going to be closed down because of low call volume and employees would be contacted regarding relocation, etc. Another message said that call center employees had to wear business casual attire to work, effective May 1, 2012. Because these messages were able to circumvent the system, AT&T was forced to reconfigure its email distribution systems, perform scans for malicious programs, and install electronic safety measures–all of these resulted in damage to AT&T’s computer systems. Moreover, AT&T’s ability to service its customers was disrupted. Its overhead and customer service costs increased.

AT&T wasn’t going to let these spammers get away so it decided to sue. AT&T seeks damages for violation of the Federal Fraud and Abuse Act.

 

 

Posted in Call Center Software |

US Corporation Using US Taxpayer Money to Train Overseas Call Center Employees

A recent article by The Paramus Post suggests that the U.S tax payer money is being used to train overseas Filipino call center workers. USAID, a government agency providing U.S economic and humanitarian assistance for more than 40 years, has since ceased participation in this program.

Many US corporations have been found to engage in creative tax dodging schemes that rob the US communities of vital sources of revenue. These businesses rely on tax payer money to subsidize the offshoring of American jobs.

Verizon and T-Mobile USA are two examples of such businesses.

Posted in Call Center Software |

Call Center Falls Victim to a Keylogger

A Mumbai based call center reports that the entire company’s IT infrastructure had been compromised by a keylogger trojan. The virus was able to capture important customer data and sell it to hackers worldwide.

Not long ago, the call center had about two hundred employees and was working on USA debt consolidation process which was handling more than 300-400 confidential credentials of US customers on a daily basis. The call center had good operations for a while until the US court sent them a notice that a huge amount of money had disappeared from numerous bank accounts. that belonged to another US company. Eventually suspicion fell upon the Indian call center and an internal investigation began.

It turned out that seven months before incident, an employee had infected the whole IT infrastructure, from workstations to servers, with a keylogger Trojan that collected keystrokes from all the systems. The medium of travel for the virus was the local area network (LAN). In addition, the call center had very poor malware/virus protection at the time. Information that was collected by the Trojan consisted of the name, addresses, credit card numbers, and social security numbers. The information would then be sent to Russian and Chinese hackers through several black hackers’ forums. Moreover, the data was also sold to Nigerians who were operating a card-cloning business.

In the end, the perpetrator was caught and all the systems during this time were cleaned up, e.g., formatted, etc. Employees were on paid leave as well.

Posted in Call Center Software |