I have been asked many times what the crooks get out of hacking or attacking a phone switch.
William Jackson offers a good explanation in this blog post
Phone DOS: What's in it for the crooks
http://gcn.com/blogs/cybereye/2013/04/phone-dos-whats-in-it-for-crooks.aspx
(Image from the blog).