{"id":23099,"date":"2021-10-08T11:33:00","date_gmt":"2021-10-08T15:33:00","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=23099"},"modified":"2025-09-05T13:09:04","modified_gmt":"2025-09-05T17:09:04","slug":"ddos-attacks-crippling-voip-infrastructure","status":"publish","type":"post","link":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/","title":{"rendered":"DDoS attacks are crippling VoIP infrastructure\u2014don&#8217;t let it happen to you!"},"content":{"rendered":"<p>Over the course of the last few months many of the largest <a href=\"https:\/\/www.sherweb.com\/voip\/\">VoIP<\/a> networks across North America and Europe have been crippled by sophisticated and specific distributed denial of service (DDoS) attacks capable of evading typical prevention measures. Many of these networks serve as the backbone of most VoIP calls and therefore are (or should be) critical <a href=\"https:\/\/www.sherweb.com\/infrastructure\/\" class=\"track-link\">infrastructure<\/a>.<\/p>\n<p>These attacks have often come in waves\u2014some lasting 24 hours\u2014and would flood a network with up to 460 gigabits of traffic per second, targeting specific services used in VoIP. A bitcoin ransom demand typically follows.<\/p>\n<p>European companies <a href=\"https:\/\/www.theregister.com\/2021\/09\/02\/uk_voip_telcos_revil_ransom\/\">Voip Unlimited<\/a> and <a href=\"https:\/\/www.uctoday.com\/unified-communications\/3-uk-voip-providers-hit-by-ddos-attacks\/\">Voipfone<\/a> were recently attacked, taking down services for a three-day period. Not long after, Canadian company <a href=\"https:\/\/www.zdnet.com\/article\/voip-company-battles-massive-ransom-ddos-attack\/\">VoIP.ms<\/a> was targeted. Their services were crippled for two weeks, and they&#8217;re still working hard at the time of writing to rebuild a more secure network and bring their customers and resellers back online.<\/p>\n<p>Up next was <a href=\"https:\/\/finance.yahoo.com\/news\/bandwidth-issues-statement-recent-ddos-221800105.html\">Bandwidth<\/a>, who carries 80% of US VoIP traffic as well as 911 services. For five days the company suffered intermittent outages that were felt across North America. It\u2019s hard to have a VoIP call to or from the US <span style=\"text-decoration: underline;\">not<\/span> go through their network at one point or another; big players such as Microsoft, Zoom, Google and Intermedia, just to name a few, all rely on Bandwidth.<\/p>\n<p>When a company\u2019s <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-pbx\/the-right-hardware-for-microsoft-teams\/\">telephones don\u2019t work properly<\/a>, regardless of the reasons or who\u2019s at fault, impacted customers are unhappy and think about switching providers. Although this might make sense when the issue is localized to the service provider&#8217;s equipment or software, when it\u2019s the underlying carriers or the PSTN (public switched telephone network) in trouble\u2014think Bandwidth and other major players such as Bell, Verizon and Telus\u2014switching from your current provider will most likely not help anything, as they depend on the same backend infrastructure to receive or terminate at least a portion of the calls. Even if they don\u2019t, there are high chances the places you\u2019re trying to call are. You can jump off a sinking ship, but you still have to swim!<br \/>\n&nbsp;<\/p>\n<h2>Understanding VoIP technology and the impact of DDoS attacks<\/h2>\n<p>As far as the technology adoption lifecycle goes, VoIP is still pretty new to the mainstream market. We also rarely hear about daily outages on various PSTN networks across the world. Sometimes cables are cut, hardware breaks and links between telephone rate centers are saturated. It happens a lot more than you think, but most people don\u2019t think twice about it. Have you ever dialed a number on your cell phone, hit send and the phone just went back to its idle screen, then you had to redial? Or had a call drop in the middle of a conversation? All services can go down, it\u2019s just a matter of <a href=\"https:\/\/www.sherweb.com\/blog\/security\/no-disaster-recovery-plan-major-problem\/\">having plans and being prepared<\/a>.<\/p>\n<p>VoIP is a totally different technology from legacy PSTN, as are the issues that can come with it. There aren\u2019t necessarily more issues, they\u2019re simply different and therefore stand out to people <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-pbx\/how-to-start-reselling-ucaas\/\">new to supporting or using VoIP<\/a>. Instead of hearing static on the line, you\u2019ll miss a second of audio. Instead of dialing a number and getting a \u201ccannot complete the call\u201d audio prompt, you might experience a delay in the initial call setup (but will make it through). Instead of reporting call quality issues directly to the phone company, <a href=\"https:\/\/www.sherweb.com\/blog\/general\/what-is-the-great-resignation\/\">IT staff<\/a> will be called in to check the local network and internet connection.<\/p>\n<p>It\u2019s important to remember that this new technology has a lot of <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-pbx\/voip-offering\/\">positives that go along with it<\/a>. Everyone now has access to an enterprise-class phone system with all the latest and greatest features\u2014voicemail to email, click to call, softphones, multiple IVRs, etc.\u2014without needing to actually purchase and maintain their own <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-pbx\/the-right-hardware-for-microsoft-teams\/\">PBX hardware<\/a>. Businesses are no longer limited to the amount of analog or digital (legacy) phone lines they connected to their phone system.<\/p>\n<p>The recent DDoS attacks involved flooding servers with 450Gb of traffic per second, which isn&#8217;t easy to generate and maintain even for modern VoIP networks. Businesses still using 20-year-old phone systems with eight analog lines, on the other hand, can be crippled by absolutely anybody able to generate as few as nine simultaneous phone calls. Let that sink in for a second.<\/p>\n<p>The good news is there are options. It really comes down to a choice every business must make about how far down the <a href=\"https:\/\/www.sherweb.com\/blog\/online-backup\/why-msps-need-veeam-disaster-recovery\/\">disaster recovery<\/a> and emergency preparedness rabbit holes they want to go. Unfortunately, most companies don&#8217;t prepare whatsoever because they don\u2019t want to spend the money for the rare times disaster recovery solutions come handy. Recent events may change this mindset, as businesses wake up to the fact that those times might not be so rare after all.<br \/>\n&nbsp;<\/p>\n<h2>What options do businesses have to keep the phones ringing?<\/h2>\n<h3>VoIP local survivability<\/h3>\n<p>The concept of local survivability in VoIP is pretty simple. An edge device, similar to a router, sits at the customer&#8217;s site and all VoIP traffic and IP device registrations go through it. This device is also home to backup connectivity to the public telephone network, typically in the form of one or many legacy analog or digital lines, depending on customer size and disaster recovery requirements.<\/p>\n<p>That\u2019s the base idea, but there are different ways of implementing it. Considering that the most crucial and vulnerable part of a phone system is the <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-pbx\/keep-the-phones-ringing\/\">ability to receive calls<\/a>, we need to think about where the phone number will reside.<br \/>\n&nbsp;<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-23102\" src=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/VoIP-local-survivability.jpg\" alt=\"VoIP local survivability for DDoS attacks\" width=\"640\" height=\"360\" srcset=\"\/blog\/wp-content\/uploads\/VoIP-local-survivability.jpg 640w, \/blog\/wp-content\/uploads\/VoIP-local-survivability-300x169.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><br \/>\n&nbsp;<\/p>\n<h3>Option 1: Keep the main number as a legacy analog line, and forward all calls to Cloud PBX<\/h3>\n<p>This option has the pre-requisite that forwarding on the line is not limited to one simultaneous call. This varies from one phone company to the next.<\/p>\n<p>In this scenario, the main phone number is a legacy analog line installed on-site at the customer&#8217;s location. Should anything happen to the internet connection at the customer site, to the <a href=\"https:\/\/www.sherweb.com\/en-ca\/voip\/cloud-pbx\/\" class=\"track-link\">Cloud PBX<\/a> service or to an underlying VoIP carrier, call forwarding to the cloud can be canceled. Calls will start coming in on the local legacy line to the edge device, which will then route the calls to the appropriate IP phones. Outgoing calls will keep going through VoIP if they can, but will have the analog line as a backup as well.<\/p>\n<h4>Pros:<\/h4>\n<ul>\n<li>Incoming and outgoing calls will keep working, although limited in capacity.<\/li>\n<li>Keep using the same IP phones for calls.<\/li>\n<li>Internal calls between extensions keep working.<\/li>\n<\/ul>\n<h4>Cons:<\/h4>\n<ul>\n<li>Incoming and outgoing calls during an external VoIP outage will be limited to the amount of analog lines you keep on site, which may be as little as one call at a time; additional callers will hear a busy signal or a voicemail prompt from the analog line.<\/li>\n<li>You need to keep paying for some legacy circuits.<\/li>\n<li>Hardware will need to be installed and maintained on-prem.<\/li>\n<\/ul>\n<h3>Option 2: Backup legacy analog phone number\/line<\/h3>\n<p>In this scenario, the customer will keep one or many backup analog lines on site to be used for incoming and outgoing calls during an external outage. The main business phone number stays in the cloud, but this number is the emergency backup to receive calls.<\/p>\n<h4>Pros:<\/h4>\n<ul>\n<li>No forwarding of analog line to Cloud PBX necessary.<\/li>\n<li>Incoming calls to the backup number will work even if internet, Cloud PBX or underlying carriers are having an outage, as well as outgoing calls.<\/li>\n<\/ul>\n<h4>Cons:<\/h4>\n<ul>\n<li>A second phone number will need to be advertised or otherwise given to potential callers in case something happens to the main number.<\/li>\n<li>Outgoing calls during an outage will not display the company&#8217;s main number, but will instead display the backup phone number.<\/li>\n<li>Customer will need to keep paying for some legacy circuits.<\/li>\n<li>Hardware will need to be installed and maintained on-prem.<\/li>\n<\/ul>\n<h3>Option 3: No local survivability, but do your homework on your backend provider<\/h3>\n<p>This is the option many businesses have chosen. There\u2019s no such thing as an unsinkable ship, but some ships are certainly built better than others. When it comes to something as critical as your phone system, an experienced provider with resources at hand goes a long long way when things go wrong. They have the <a href=\"https:\/\/www.sherweb.com\/en-ca\/partners\/support\/\" class=\"track-link\">resources and expertise<\/a> to tackle big issues in ways a small business simply couldn\u2019t afford. <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-pbx\/benefits-of-ucaas-and-how-it-works\/\">Communications services<\/a> can and should still be purchased from your local small business\u2014you just might want to make sure they have a provider in the background helping out and aren&#8217;t running their own server in a basement somewhere.<br \/>\n&nbsp;<\/p>\n<h2>Sherweb can help<\/h2>\n<p>Sherweb has <a href=\"https:\/\/www.sherweb.com\/partners\/support\/\" class=\"track-link\">years of experience<\/a> hosting and protecting various cloud services. Our team is well-prepared and trained to handle emergencies of all kinds. Our VoIP infrastructure is a commercially maintained high availability (HA) platform, equipped with carrier level redundancy so that should anything happen to our entire infrastructure, including backup data centers and servers, there&#8217;s yet another way of making sure customers&#8217; calls keep coming in.<\/p>\n<p>For our outgoing calls, we have a chain of carriers permanently ready to make sure those calls go through. Should one of them suffer an outage for whatever reason, our switch will automatically use another carrier to route the call, typically only costing the caller a fraction of a second delay in call handling. Our <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-pbx\/sherweb-voip-services-help-msps-grow\/\">VoIP infrastructure<\/a>, along with every carrier we\u2019re directly connected to, is constantly and automatically monitored and tested to ensure quality and reliability.<\/p>\n<p>When Sherweb detects an issue with either our own infrastructure or the infrastructure of another carrier, we update partners and customers through our <a href=\"https:\/\/support.sherweb.com\/NetworkStatus\">Network Status page<\/a>. It\u2019s important to note that an outage on Sherweb\u2019s status page does not necessarily mean Sherweb itself is having an outage\u2014it can be a PSTN infrastructure issue, like a fiber optic cable being cut somewhere. If our customers are impacted, even if it\u2019s not related to us, we post it to the status page and continue to monitor the situation.<br \/>\n&nbsp;<\/p>\n<h2>Protect your phone system from DDoS attacks and other threats<\/h2>\n<p>During all of the recent outages caused by DDoS attacks, only some Sherweb customers were affected. The VoIP.ms outage didn\u2019t impact any of our customers at all. Knowing the situation, our VoIP team pulled off some rather speedy port-outs during the outage to help bring some customers&#8217; phones back to life while they were still under attack.<\/p>\n<p>The Bandwidth outage did admittedly affect incoming calls to many Sherweb customers with US phone numbers. We&#8217;re connected directly to Bandwidth, among many other carriers. We didn\u2019t put all our eggs in one basket, though, so a good portion of our customer base managed to sail through the VoIP.ms and Bandwidth outages without noticing any issues at all, other than not being able to call other VoIP.ms or Bandwidth customers.<\/p>\n<p>Like it or not, VoIP is the direction telecom has gone in. Telecom itself has changed! It\u2019s just not about voice alone anymore, but a <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-pbx\/sherweb-united-communications\/\">unified communications experience<\/a> bringing voice, video, chat, screen sharing and live document collaboration all together. With time, like with any <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/digital-transformation-mission-critical\/\">new technology<\/a>, we&#8217;ll overcome current hurdles and adapt to a new normal. VoIP local survivability (maybe coupled with SD-WAN\u2014but that\u2019s a whole other story) may become standard in the future. The point is that there are resources available to help businesses manage the transition.<\/p>\n<p>Sherweb is committed to helping its customers stay connected and will do what it takes to provide our partners with what they need to run their businesses effectively. <a href=\"https:\/\/www.sherweb.com\/en-ca\/about\/contact-us\/\" class=\"track-link\">Get in touch with us<\/a> if you want to talk more about the recent DDoS attacks on VoIP infrastructure, VoIP in general, or anything else about your business&#8217;s IT environment. You can also check out our <a href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\" class=\"track-link\">Partner Guide<\/a> for more information about how Sherweb can help your business grow.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the course of the last few months many of the largest VoIP networks across North America and","protected":false},"author":150,"featured_media":23103,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[371],"tags":[446,683,684,919],"class_list":["post-23099","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-solutions","tag-disaster-recovery","tag-voip","tag-cloud-pbx","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS attacks crippling VoIP infrastructure | Sherweb<\/title>\n<meta name=\"description\" content=\"Some of the largest VoIP networks across North America and Europe have been crippled by DDoS attacks capable of evading typical prevention measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS attacks crippling VoIP infrastructure | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Some of the largest VoIP networks across North America and Europe have been crippled by DDoS attacks capable of evading typical prevention measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-08T15:33:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-05T17:09:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/VoIP-DDOS-attacks-1200x480@2x.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jason Nadeau\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason Nadeau\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/\"},\"author\":{\"name\":\"Jason Nadeau\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/19a5faf7b8dffcebb309157660603e49\"},\"headline\":\"DDoS attacks are crippling VoIP infrastructure\u2014don&#8217;t let it happen to you!\",\"datePublished\":\"2021-10-08T15:33:00+00:00\",\"dateModified\":\"2025-09-05T17:09:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/\"},\"wordCount\":2007,\"commentCount\":4,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/VoIP-DDOS-attacks-1200x480@2x.jpg\",\"keywords\":[\"Disaster Recovery\",\"VoIP\",\"Cloud PBX\",\"Cybersecurity\"],\"articleSection\":[\"Business Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/\",\"name\":\"DDoS attacks crippling VoIP infrastructure | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/VoIP-DDOS-attacks-1200x480@2x.jpg\",\"datePublished\":\"2021-10-08T15:33:00+00:00\",\"dateModified\":\"2025-09-05T17:09:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/19a5faf7b8dffcebb309157660603e49\"},\"description\":\"Some of the largest VoIP networks across North America and Europe have been crippled by DDoS attacks capable of evading typical prevention measures.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/VoIP-DDOS-attacks-1200x480@2x.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/VoIP-DDOS-attacks-1200x480@2x.jpg\",\"width\":2400,\"height\":920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/ai-productivity\\\/business-solutions\\\/ddos-attacks-crippling-voip-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI &amp; Productivity\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/ai-productivity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Business Apps\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/ai-productivity\\\/business-solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"DDoS attacks are crippling VoIP infrastructure\u2014don&#8217;t let it happen to you!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/19a5faf7b8dffcebb309157660603e49\",\"name\":\"Jason Nadeau\",\"description\":\"Jason is passionate about Telecom, it\u2019s as much a hobby as it is his career. Certified and trained by top manufacturers of VoIP equipment, he has 20 years of experience in PBX sales, installation and support.\",\"url\":\"https:\\\/\\\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\\\/blog\\\/author\\\/jason-nadeau\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS attacks crippling VoIP infrastructure | Sherweb","description":"Some of the largest VoIP networks across North America and Europe have been crippled by DDoS attacks capable of evading typical prevention measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"DDoS attacks crippling VoIP infrastructure | Sherweb","og_description":"Some of the largest VoIP networks across North America and Europe have been crippled by DDoS attacks capable of evading typical prevention measures.","og_url":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2021-10-08T15:33:00+00:00","article_modified_time":"2025-09-05T17:09:04+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/VoIP-DDOS-attacks-1200x480@2x.jpg","type":"image\/jpeg"}],"author":"Jason Nadeau","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"Jason Nadeau","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/"},"author":{"name":"Jason Nadeau","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/19a5faf7b8dffcebb309157660603e49"},"headline":"DDoS attacks are crippling VoIP infrastructure\u2014don&#8217;t let it happen to you!","datePublished":"2021-10-08T15:33:00+00:00","dateModified":"2025-09-05T17:09:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/"},"wordCount":2007,"commentCount":4,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/VoIP-DDOS-attacks-1200x480@2x.jpg","keywords":["Disaster Recovery","VoIP","Cloud PBX","Cybersecurity"],"articleSection":["Business Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/","url":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/","name":"DDoS attacks crippling VoIP infrastructure | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/VoIP-DDOS-attacks-1200x480@2x.jpg","datePublished":"2021-10-08T15:33:00+00:00","dateModified":"2025-09-05T17:09:04+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/19a5faf7b8dffcebb309157660603e49"},"description":"Some of the largest VoIP networks across North America and Europe have been crippled by DDoS attacks capable of evading typical prevention measures.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/#primaryimage","url":"\/blog\/wp-content\/uploads\/VoIP-DDOS-attacks-1200x480@2x.jpg","contentUrl":"\/blog\/wp-content\/uploads\/VoIP-DDOS-attacks-1200x480@2x.jpg","width":2400,"height":920},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/ai-productivity\/business-solutions\/ddos-attacks-crippling-voip-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"AI &amp; Productivity","item":"https:\/\/www.sherweb.com\/blog\/category\/ai-productivity\/"},{"@type":"ListItem","position":3,"name":"Business Apps","item":"https:\/\/www.sherweb.com\/blog\/category\/ai-productivity\/business-solutions\/"},{"@type":"ListItem","position":4,"name":"DDoS attacks are crippling VoIP infrastructure\u2014don&#8217;t let it happen to you!"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/19a5faf7b8dffcebb309157660603e49","name":"Jason Nadeau","description":"Jason is passionate about Telecom, it\u2019s as much a hobby as it is his career. Certified and trained by top manufacturers of VoIP equipment, he has 20 years of experience in PBX sales, installation and support.","url":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/author\/jason-nadeau\/"}]}},"tag_names":["Disaster Recovery","VoIP","Cloud PBX","Cybersecurity"],"_links":{"self":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/23099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/users\/150"}],"replies":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/comments?post=23099"}],"version-history":[{"count":4,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/23099\/revisions"}],"predecessor-version":[{"id":23106,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/23099\/revisions\/23106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media\/23103"}],"wp:attachment":[{"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media?parent=23099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/categories?post=23099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebblogprd-c5f5cbg9dbf0btgy.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/tags?post=23099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}