NYSE: IDT
Stay ahead with IDT Express
Products

Discover how our products can revolutionize the way you communicate and collaborate.

Voice

Explore our advanced voice solutions designed to optimize your communication workflows.

Diverse range of DID number solutions designed to enhance your communication capabilities.

Experience unparalleled communication efficiency with our advanced SIP Trunking Solutions.

Cutting-edge technology to proactively detect and neutralize spam flags on your DID Numbers.

Enable your customers to connect with your business by dialing a toll-free number.

AI voice agents that handle calls, capture leads, and provide customer support automatically, anytime.
Messaging

Wherever your audience is, our platform ensures seamless messaging across diverse channels.

Build customer journeys by fostering interactive conversations, all within the framework of your app. 

Connect with your audience in a simple and effective way through our cutting-edge SMS platform. 

BYOC

Harness the power of IDT as your chosen carrier while leveraging your platform’s advanced features and services.

Integrate Twilio with our robust carrier routing platform to achieve unparalleled Voice termination system.

Experience reliable and high-quality communication services while leveraging the advanced capabilities of Genesys. 

Integrate IDT with the collaborative strength of MS Teams, unlocking efficient and feature-rich communication. 

Experience the power of our carrier network seamlessly connected to Plivo through our cutting-edge BYOC solution. 

Tools

Experience the power of our online voice tools, designed to simplify communication management. 

Ensure the authenticity and integrity of outbound calls with our STIR/SHAKEN Verification Check tool. 

User-friendly tool to verify the reputation of your business number, ensuring that it remains trusted. 

Compare and gain insights into outbound call expenses, optimize budget, and make informed decisions. 

Easily estimate and compare the costs associated with different DID numbers providers. 

Compare inbound VoIP rates among top CPaaS providers and optimize your inbound call costs. 

Generate custom SMS templates. 

Resources

Empower yourself with the resources you need to thrive in the dynamic landscape of communication.

Articles covering a wide range of topics.

Discover our video guides.

Get answers to common queries.

Find instructions to make the most of our products.

Stay informed with today's most important news stories

Discover telecom insights and trends.

Find definitions of popular telecom terms.

Discover the upcoming events on our calendar
Company

A global telecom partner built to meet your needs. 

Discover the story behind our commitment to delivering innovative solutions to connect people and businesses worldwide. 

Learn about our robust network infrastructure that spans across the globe, ensuring reliable and secure connectivity. 

Got a question, feedback, or need assistance? Our dedicated team is here to help!

Find partners or sign up for partnership programs.

NYSE: IDT
Learn / Blog

SIP Trunking Security: Defending Against Toll Fraud & DDoS in 2026

|
|  7 min
In this article

Your SIP trunk gets hit overnight. By morning, someone had racked up $40,000 in calls to international premium rate numbers. The calls have stopped, but the bill is real, and you own it.

The terrifying reality is that your voice network is a high-value target—not for spies or data thieves, but for digital highway robbers who operate silently until the bill arrives. This isn’t just about dropped calls; it’s about the financial integrity of your business being compromised by an automated, relentless attack vector. The sheer speed and scale of modern SIP attacks mean that by the time you notice the unauthorized activity, the damage is likely already done, leaving finance teams to grapple with catastrophic, unanticipated telecom expenses.

Toll fraud is the most financially damaging SIP trunking security threat, and it happens far more often than most IT teams expect. This guide covers the real security risks, the best practices that actually stop attacks, and what to look for at the carrier level.

Is SIP Trunking Secure?

SIP trunking is as secure as the infrastructure around it, the protocol itself was not designed with modern threat models in mind, and requires deliberate configuration to harden.

SIP signaling travels as readable text by default. Authentication is weak without explicit enforcement. Many SIP implementations accept connections from any IP address unless locked down. That said, SIP trunking is not inherently less secure than traditional phone lines, PSTN is far from immune to fraud. The difference is that SIP attacks can be automated, scaled, and launched remotely by anyone with a list of exposed IP addresses. The FCC’s STIR/SHAKEN framework was introduced specifically to address SIP’s most exploited vulnerability: the ease of caller ID spoofing. A provider that implements it at the carrier level is your first line of defense.

What Are the Security Issues with SIP Trunking?

Toll fraud is the costliest attack. An attacker gains access to your SIP credentials, through brute force, credential stuffing, or an exposed port, and routes calls to international premium rate numbers they control. The revenue goes to them; the bill goes to you. A single undetected weekend can generate five figure losses, with some businesses reporting six figure incidents before automated alerts triggered. The primary entry points are weak SIP passwords, open SIP ports on the public internet, and PBX systems configured to allow outbound calls without proper authentication.

SIP DDoS and flooding targets the signaling layer of your voice infrastructure. Attackers flood your system with INVITE, REGISTER, or OPTIONS messages at a volume that overwhelms processing, dropping calls, degrading quality, or taking your contact center offline entirely during a campaign. Standard network DDoS mitigation doesn’t catch SIP floods unless it’s SIP aware. Effective defense requires rate limiting at the SIP layer, typically handled by your Session Border Controller or a SIP specific firewall rule set.

Caller ID spoofing is trivial over SIP, any number can be presented in the caller ID field. Attackers use this to impersonate your business, damaging your caller ID reputation with recipient carriers and potentially getting your legitimate outbound numbers flagged as spam before your agents dial. Once a number is flagged across major carrier databases, rebuilding its reputation requires active remediation, not simply stopping the spoofed traffic.

Eavesdropping and media interception affects unencrypted SIP signaling and RTP audio streams on shared networks. For contact centers handling payment card data or health information, this creates direct PCI DSS and HIPAA exposure, including the requirement to demonstrate that voice data is encrypted in transit. TLS for signaling and SRTP for media are the standard countermeasures and the baseline expectation of any compliance audit.

Registration hijacking occurs when an attacker intercepts a SIP REGISTER message and substitutes their own contact address for a legitimate extension. Incoming calls route to the attacker’s endpoint instead of your agents, difficult to detect before damage is done without mutual authentication between your PBX and SIP trunk provider.

SIP Trunk Security Best Practices for 2026

Enforce strong credentials and IP allow lists. Replace any default SIP username and password immediately. Restrict inbound SIP connections to your trunk provider’s IP address ranges, not the open internet.

Enable TLS for SIP signaling and SRTP for media. TLS encrypts signaling so credentials and metadata cannot be read in transit. SRTP encrypts the audio stream. Both should be enforced at the trunk level and at your SBC.

Deploy a Session Border Controller (SBC). An SBC sits at the edge of your voice network, enforces call admission control, strips internal IP addresses from SIP headers, blocks malformed packets, and rate limits REGISTER attempts to prevent brute force. For any serious deployment, an SBC is not optional.

Configure a SIP trunk security profile. In Cisco Call Manager (CUCM), FreePBX, and Asterisk, trunk security profiles define encryption and authentication requirements per trunk. In CUCM, the profile sets the trunk to non secure, authenticated, or encrypted mode. Encrypted mode, enforcing both TLS and SRTP, is the minimum standard for any production contact center trunk.

Implement real time anomaly monitoring. Set hard limits on concurrent outbound calls, per destination volumes, and calls to international high risk number ranges. Any spike outside normal patterns should trigger an automatic block, not just an alert that sits unread in an inbox. Most toll fraud losses happen over weekends when nobody is watching dashboards.

Verify STIR/SHAKEN attestation. Without carrier level signing, outbound calls risk being labeled “Scam Likely” by terminating carriers. Confirm your provider signs outbound calls with an attestation for traffic you fully originate, B and C attestation levels indicate partial or unverified routing and receive weaker trust scores from downstream carriers.


The Role of AI in Defending Against SIP Attacks (Wangiri and More)

The speed and volume of modern SIP attacks—especially toll fraud variants like Wangiri (a “one ring” call-back scam)—have outpaced traditional rule-based defenses. Wangiri typically relies on generating huge volumes of short-duration calls to expensive international numbers to bait recipients into calling back, but AI’s role extends to detecting automated attacks on the signaling layer as well.

AI, specifically through machine learning (ML), is becoming essential for real-time SIP security due to its ability to:

  • Baseline Normal Traffic: ML algorithms can establish a detailed baseline of your organization’s normal voice traffic patterns, including call volume, duration, destinations, time of day, and frequency of specific SIP messages (INVITE, REGISTER, etc.).
  • Identify Behavioral Anomalies: Unlike static rate limits, AI detects subtle, coordinated changes in behavior. For toll fraud, this means identifying an immediate, sharp increase in calls to a newly observed high-risk country code or unusually high concurrent calls originating from a single endpoint.
  • Contextual Attack Detection: For DDoS/flooding attacks, AI can differentiate between a legitimate traffic spike (e.g., a major sales campaign starting) and a malicious flood of OPTIONS or INVITE messages by analyzing the packet structure and source reputation in real time, preventing false positives that drop legitimate calls.
  • Predictive Blocking: Advanced models can identify emerging attack signatures—such as a new combination of user agents or malformed headers—and automatically adjust security policies to block them network-wide before they can establish a full foothold, offering a proactive layer of defense beyond simple blacklisting.

In 2026, most carrier-grade fraud monitoring systems use AI/ML to watch for suspicious spikes in call attempts to premium rate numbers, providing the only effective defense against the automated, high-velocity nature of Wangiri and sophisticated toll fraud campaigns.

Carrier Level Security: What IDT Express Provides

Security at the PBX level protects your internal infrastructure. Security at the carrier level protects every call that leaves it.

IDT Express implements STIR/SHAKEN caller ID authentication across all outbound traffic and offers a free STIR/SHAKEN attestation check for businesses wanting to verify their outbound call signing before campaigns go live. Mr. Caller ID monitors your business numbers against major US carrier spam databases, giving contact centers visibility into caller ID health that most retail SIP providers don’t surface.

IDT Express SIP trunking infrastructure runs on AWS based architecture with built in redundancy across multiple availability zones, providing resilience against SIP flooding attacks at the network level. A Z Platinum CLI routes across 160+ countries include dedicated call center termination routes with carrier level fraud monitoring. Businesses connecting via Bring Your Own Carrier get Concierge support, direct escalation access, not a ticket queue, when security incidents require immediate carrier response.

Talk to a SIP Trunking Security Specialist free assessment of your SIP infrastructure, STIR/SHAKEN attestation status, outbound number reputation, and carrier level fraud exposure.

Frequently Asked Questions

Is SIP trunking secure?

SIP trunking is secure when properly configured, but the protocol has known vulnerabilities, unencrypted signaling, weak default authentication, and open registration, which require deliberate mitigation through encryption, SBCs, IP allow listing, and carrier level fraud monitoring.

What are the main security risks of SIP trunking?

Toll fraud (the costliest attackers exploit weak credentials to rack up premium rate call charges), SIP DDoS flooding, caller ID spoofing, eavesdropping on unencrypted media, and registration hijacking.

How do I secure my SIP trunk?

Enable TLS for signaling and SRTP for media. Deploy a Session Border Controller. Enforce strong credentials and IP allow lists. Set real time call anomaly monitoring with automatic blocking. Verify your carrier implements STIR/SHAKEN outbound signing.

What is a SIP trunk security profile in CUCM?

In Cisco Call Manager, a SIP trunk security profile defines whether a trunk operates in non secure, authenticated, or encrypted mode. Encrypted mode enforces both TLS and SRTP, the minimum standard for any production voice trunk carrying business or contact center traffic.

What does SIP trunking security cost?

TLS/SRTP encryption and IP allow listing are included in enterprise grade PBX platforms and most serious SIP providers. STIR/SHAKEN attestation checks and spam monitoring are offered free by IDT Express. A cloud based SBC starts from around $300/month for smaller deployments, enterprise on premise SBCs range from $1,500 upwards depending on capacity.

Share this article

Leave a Reply

Your email address will not be published. Required fields are marked *

Tags

Meet our wholesale voice routing

Fulfill all your voice calling needs with our category leading wholesale A-Z Voice Termination.
Try IDT Express for a $25 Credit

Get $25 Free Trial Credit

Get IDT Express articles in your inbox

The best source of information in the telecom industry. Join us.

    Most Popular

    IDT Express Blogs1
    |
    |  9 min
    If you’ve been researching SIP trunk providers, every vendor claims...
    IDT Express Blogs
    |
    |  7 min
    RingCentral is the default choice for business phones, until the...
    Heading (6)
    |
    |  5 min
    When evaluating a Computer Telephony Integration deployment, one question comes...