Over the last year, our office phones have been targeted multiple times by a dating app hacker, suspected to be an envious colleague. Despite reaching out to AT&T, we’ve seen no resolution—could Reddit offer a solution?

Unraveling a Workplace Mystery: The Case of the Hacked Office Phones

In a unique twist that feels straight out of a detective novel, the office where I work is currently embroiled in an unsettling mystery involving phone hacking. For the past year, our office phones have been persistently hijacked, redirecting our calls to an untrustworthy dating service. This alarming situation has led us to suspect a malicious coworker, and despite our efforts to seek assistance from our service provider, AT&T has been unable to solve the issue.

As a dedicated employee, I’ve reached a breaking point. The workplace environment has become so toxic that I am seriously considering resigning. What troubles me most is the indifference from upper management, who seem unwilling to consider that someone within our ranks could intentionally sabotage the business. Nevertheless, I find it essential to seek justice before making any drastic decisions.

It’s worth noting that this bizarre scenario unfolds in a law firm, where the perpetrator could potentially face legal consequences if caught. The irony of this situation is not lost on me, especially given the nature of our work. This coworker, who I suspect is responsible for these continuous intrusions, embodies the worst of office politics. The atmosphere has morphed into a twisted game of Clue, where trust is hard to come by, and everyone seems like a potential suspect.

The Unraveling Mystery

Our office is equipped with outdated phones from a company called Comdial, now known as Zeracom. We operate six lines, with one dedicated to receiving client calls. Unfortunately, we’re frequently plagued by the nuisance of calls being forwarded to a dubious dating service multiple times daily. Today alone, this occurred four times. The only way we can reclaim our lines is by dialing 73# or *73, a temporary fix for a recurring problem.

What complicates matters is the consensus from ten professionals, including AT&T representatives and phone system technicians, all asserting that this type of hacking cannot happen externally. This revelation points to an internal perpetrator manipulating the system from within the office. However, despite the mounting evidence, our higher-ups are entrenched in denial. They have even suggested switching providers, but this merely challenges the symptoms rather than addressing the root cause: a potentially malicious coworker.

The suspected individual is particularly alarming, as she also manages our check deposits—an unsettling thought that raises further suspicions. Fortunately, I can confide in the company accountant, who happens to be

Share this content:

One Comment

  1. It sounds like you’re dealing with a complex internal security issue, especially since external experts are indicating that external hacking is unlikely. Given that your phones are outdated (Zeracom/Comdial), and the issue persists despite temporary fixes like dialing 73# or *73, here are some steps you might consider:

    • Perform a thorough physical inspection: Check for any unauthorized or suspicious devices connected to the phone lines or ports that could be facilitating internal manipulation.
    • Audit internal access: Review who has administrative or physical access to the phone system. Limit access to trusted personnel only.
    • Update or replace outdated hardware: Consider upgrading to a modern phone system with better security features and logging capabilities. Although this might involve initial costs, it can prevent future internal exploitation.
    • Implement internal security protocols: Enforce strict password policies, monitor call forwarding settings regularly, and log changes to the system to detect anomalies early.
    • Consult with a professional: Engage an internal or external VoIP/security specialist who can conduct a comprehensive security audit, including inspecting the physical hardware and network configurations.
    • Document all incidents: Keep detailed records of each hacking attempt or incident, including times, nature of the call redirections, and any suspected personnel involved.

Leave a Reply

Your email address will not be published. Required fields are marked *