Guide to Detecting and Preventing Telecom Fraud
According to the Federal Trade Commission, telecom fraud accounted for 42% of fraud complaints in 2016, up from 34% in 2012. These numbers continue to grow, as new technology has led to an onslaught of new telecom fraud tactics. The latest schemes are difficult to track and investigate because of their frequency, frequency, their layers of anonymity, and their global nature. This guide will help you learn about a bout the different types of telecom fraud and industry best practices for detection and prevention. Three Major Categories of Telecom Fraud
We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are: 1. 2. 3.
Schemes to Defraud Telecom Service Providers – These schemes are the most complicated, and exploit telecom service providers using stimulated traffic, SIP trunking, regulatory loopholes, and more. Schemes to Defraud Subscribers – This is simply any scheme that involves gaining access to someone else’s account to make free phone calls. Schemes Conducted Over the Telephone – Also known as “Phone Fraud,” this category covers all types of general fraud that are perpetrated over the telephone
Schemes to Defraud Telecom Service Providers
Telecom Service Providers are particularly vulnerable to telecom fraud. Fraudsters are able to manipulate telecom regulatory systems to their advantage, and to the disadvantage of the service provider, in ways that are difficult to detect, trace, and prosecute. Fraudsters often take advantage of lax security security practices of a service provider’s customers. A customer whose network has been compromised will often refuse to pay large fraudulent charges, leaving the service provider to cover the bill. Finally, attacks frequently happen over holidays and weekends, weekends, when networks are often monitored less closely. The industry best practice for detecting and preventing this type of telecom fraud is to monitor Call Detail Records (CDRs) in real time for suspicious traffic or call patterns. patterns. To truly shut down fraud, any fraud prevention prevention system should be combined with call routing technology. NexOSS and SDReporter from TransNexus are currently the only solutions that combine fraud detection with routing. This means that when suspicious traffic is identified, the TransNexus programs will automatically change the outgoing calling plans to re-route dangerous traffic, stopping the fraudulent activity before it gets started. Call Transfer Fraud What is Call Transfer Telecom Fraud?
One type of telecom fraud that has been a particular issue for soft switch users is call transfer fraud. In this scenario, the fraudster hacks into a PBX and uses uses that PBX’s services to make free long distance distance calls. By instructing the compromised PBX to transfer the call to the hacker’s own phone service, subscribers to the fraudster’s phone service can speak to their international destinations through the hacked soft switch, a nd the soft switch operator cannot bill the hacker’s subscriber. Those familiar with three-way calling will recognize the inspiration for call transfer fraud.
Call Transfer Fraud Scenario
1.
Hacker phone service hacks unsuspecting PBX to make a call to make international calls
2.
PBX sends SIP INVITE to soft switch
3.
Softswitch routes call to international carrier
4.
Hacker instructs PBX to blind transfer call to Hacker Phone Service
5.
PBX sends SIP REFER to soft switch to blind transfer call to Hacker Phone Service
6.
Softswitch sends SIP INVITE to Hacker Phone Service
7.
Hacker’s Subscriber speaks to international destination through soft switch.
Most soft switches have no way of tracking a call once it is transferred out of the network, so fraudsters can generate a significant amount of traffic and revenue for themselves before being ca ught. False Answer Supervision What is False Answer Supervision Telecom Fraud?
When a dialed phone number is not in service, the calling party will hear a brief recording telling them so. There is no answer supervision or connection between the calling and called party. Since the call never connects, it is an incomplete call and should not be billed. However, fraudsters use false answer supervision to make these calls appear as completed calls which may be billed. Perhaps the fraudster has published rates for terminating calls without any intention of actually completing the calls. Here, service providers will route calls through the fraudster, who, instead of terminating the call, will play a not in service message and then bill the service provider for more than 10 seconds of calling. This type of fraud hurts the originating service provider both by costing money, and by hurting their reputation. The key indicators of this type of fraud are:
Short phone calls
Calling party hangs up nearly 100% of the time
High answer seizure ratio
False Answer Supervision Fraud Call Scenario
1.
Subscriber makes a call
2.
Service provider routes calls to its wholesale L east Cost Routing Provider
3.
The wholesale customer routes the call to a wholesale provider who has been chosen for its exceptionally good rates to certain high cost destinations
4.
In most cases, the wholesale provider completes the call, but in some cases, the wholesale provider routes calls to the high cost destination with a “false answer” – charging for a completed call, without ever trying to complete it
Location Routing Number Fraud What is Location Routing Number Telecom Fraud?
Location Routing Number Fraud or LRN fraud works based on the desire of some service providers to avoid extra charges from LRN “dips.” Most providers will run an LRN dip to determine the correct LRN for a dialed number. However, many service providers will not perform an LRN dip if the LRN is already in the SIP message. Fraudsters take advantage of this by inserting fake LRNs into their calls. For example, they may insert the LRN for a relatively cheap terminating destination, when the call is actually going to a high cost rural destination. The service provider will then bill the fraudster for the cheaper call, but will have to eat the cost of the expensive rural call. In some cases, this can be up to 5x the price they billed the fraudster. Location Routing Number Fraud Call Scenario
1.
Source Network sends a call to a wholesale provider with an incorrect low co st LRN in the SIP INVITE
2.
Provider charges the Source Network for a call to the incorrect LRN
3.
The provider completes the call
4.
The correct LRN for the call is more expensive than expected. The provider loses money, and the Source Network gets below cost termination.
Revenue Sharing Fraud
What is Revenue Sharing Telecom Fraud?
Revenue share fraudulent activities are those which abuse carrier interconnect agreements. Cooperation is the key to this type of fraud. The fraudster’s goal is to pair up with a destination that can charge high rates, and then inflate traffic to his numbers at little or no cost to himself. These types of schemes can occur within a country, or across international borders. Though they may not be technically illegal, they are often also paired with PBX hacking or other forms of fraud that generate illegal and artificial traffic. How to Detect Revenue Sharing Fraud
The typical call signature for revenue sharing fraud is a spike in traffic to high cost destinations. Because these spikes often occur over holidays or weekends, service providers must have a monitoring and alarm system in place that will stop the fraud immediately. TransNexus solutions monitor Call Detail Records (CDRs) in real time. They look at five minute samples of call attempts for suspicious spikes. When a spike occurs, the solutions will send Email and SNMP fraud alerts. In addition to the alarms, TransNexus solutions may be configured to re-route calls or change the outgoing dial plan of subscribers who may have been compromised.
Multiple Transfer Fraud What is Multiple Call Transfer Telecom Fraud?
Multiple call transfers are a sophisticated technique for doubling International Revenue Sharing Fraud while making the fraud more difficult to detect. Multiple Call Transfer Fraud Scenario
1.
Fraudster phone service hacks an enterprise PBX to make calls to high cost destinations
2.
PBX sends SIP INVITE to service provider’s soft switch
3.
Service provider routes call to high cost destination
4.
Fraudster instructs PBX to transfer call to another high cost destination
5.
The fraudster hangs up. The call between the two high cost destinations remains in place.
6.
Fraudster shares in the revenue from the fraudulent calls.
7.
Fraudster repeats steps 2-6 to set up hundreds or thousands of simultaneous calls
Once the calls are transferred, they stay up until the carrier shuts it down. TransNexus customers report calls staying up for over 24 hours. On many platforms transferred calls don’t count against concurrent calls, and most switches won’t cut a call record until the call is over. If the criminal is clever, he will transfer dozens or hundreds of calls concurrently. They are pinned in the network, and can go unnoticed until it is too late. How to Detect Multiple Call Transfer Fraud
The typical call signature for any type of IRSF is a spike in traffic to high cost destinations. Because these spikes often occur over holidays or weekends, service providers must have a monitoring and alarm system in place that will stop the fraud immediately. TransNexus solutions monitor Call Detail Records (CDRs) in real time. They look at five minute samples of call attempts for suspicious spikes. When a spike occurs, the solutions will send Email and SNMP fraud alerts. In addition to the alarms, TransNexus solutions may be configured to re-route calls or change outgoing dial plans. Call Forwarding Fraud What is Call Forwarding Telecom Fraud?
The Call Forwarding hack is a more sophisticated form of VoIP telecom fraud. In this case, fraudsters are hacking through the user access web portal of an enterprise PBX. By guessing a user’s password, they can login to a PBX, and configure call forwarding to an expensive long distance destination to profit from IRSF. Then the hacker will call the telephone number of the hacked account which forwards the call for IRSF. Call Forwarding Fraud Scenario
1.
Fraudster accesses the web interface of a PBX or IVR of a voice mail system, co mpromises a user’s login and password, and sets the user’s account to forward calls to a high cost destination.
2.
Fraudster calls the compromised number over either the PSTN or VoIP.
3.
Compromised PBX forwards the call to the service provider’s softswitch.
4.
The service provider switch forwards the call to the high cost destination. The service provider must pay to complete the fraudulent calls, but rarely receives payment from the enterprise with the compromised PBX.
5.
The fraudster shares in the revenue from the fraudulent calls.
How to Detect Call Forwarding Fraud
The typical call signature for any type of IRSF is a spike in traffic to high cost destinations. Because these spikes often occur over holidays or weekends, service providers must have a monitoring and alarm system in place that will stop the fraud immediately. TransNexus solutions monitor Call Detail Records (CDRs) in real time. They look at five minute samples of call attempts for suspicious spikes. When a spike occurs, the solutions will send Email and SNMP fraud alerts. In addition to the alarms, TransNexus solutions may be configured to re-route calls or change outgoing dial plans.
International NANPA Fraud What is International NANPA Telecom Fraud?
The NANPA (North American Numbering Plan Administration) lists both numbers within the United States, as well as select international numbers found in North America, the Caribbean, and US territories. At the same time, many switches do not consider numbers listed in NANPA as international, even though they are off-shore. Our customers report that this leaves them vulnerable to International Revenue Share Fraud (IRSF) because they cannot block calls to certain off shore high fraud destinations like the Caribbean. How to Detect International NANPA Telecom Fraud
For organizations who cannot block off shore numbers listed in NANPA or the LERG, TranNexus solutions offer a work around. TransNexus solutions monitor Call Detail Records (CDRs) in real time. They look at five minute samples of call attempts for suspicious spikes. When a spike occurs, the solutions will send Email and SNMP fraud alerts. In addition to the alarms, TransNexus solutions may be configured to re-route calls or change the outgoing dial plan of subscribers who may have been compromised.
International Revenue Sharing Fraud (IRSF) What is International Revenue Sharing Fraud (IRSF)?
International Revenue Sharing Fraud (IRSF) is, without a doubt, both the most damaging and the most prevalent VoIP telecom fraud scenario. Revenue share fraudulent a ctivities are those which abuse carrier interconnect agreements. The fraudster partners with a local carrier that charges high rates for call termination and agreement to share revenue for any traffic generated by the fraudster. Common destinations for these ca lls include West African countries, UK mobile numbers, and satellite phones. IRSF is characterized by large amounts of calls, often with long duration, to a single destination. While it is not difficult to detect IRSF by examining Call Detail Records (CDRs), by the time you collect the CDRs, the damage has been done. “IRSF is the most common form of fraud we see,” said Ryan Delgrosso, CTO of Phone Power. “The international carrier that delivers the last mile is obligated for paying the final destination telco. They charge the carrier that sent them the call, and the cost flows downhill until you get to the access point that was compromised. Further complicating matters, these schemes always cross international boundaries making pursuing it from a criminal perspective almost impossible. Access or retail service providers usually end up eating the costs.” International Revenue Sharing Fraud Scenario
The first step for a potential VoIP fraudster is gaining illegal access to your network. As with any large network, it is nearly impossible to protect every access point to a VoIP network. This is especially true for retail service providers whose customers access the service provider’s network over the Internet using a wide range of diff erent access devices. Residential or small business customers access the service provider network using analog telephone adaptors (ATAs) that may be easily compromised. Larger enterprises may access the service pro vider’s network via a SIP trunk connected to a Private Branch eXchange (PBX) which aggregates traffic from hundreds of SIP phones. Many of the SIP phones may be on the public Internet and completely removed from any security precautions that could be enforced the enterprise or service provider. In addition, lax PBX security precautions can make PBX hacking a simple task. How to Detect International Revenue Sharing Fraud
The typical call signature for revenue sharing fraud is a spike in traffic to high cost destinations. Because these spikes often occur over holidays or weekends, service providers must have a monitoring and alarm system in place that will stop the fraud immediately. TransNexus solutions monitor Call Detail Records (CDRs) in real time. They look at five minute samples of call attempts for suspicious spikes. When a spike occurs, the solutions will send Email and SNMP fraud alerts. In addition to the alarms, TransNexus solutions may be configured to re-route calls or change outgoing dial plans. Traffic Pumping What is Traffic Pumping Telecom Fraud?
Because of telephone regulations, long distance carriers must pay access fees to local exchange carriers for calls to those carriers’ local subscribers. Rural carriers may charge substantially higher access fees than urban carriers. In order to increase their incoming call volume a nd revenue, some rural carriers partner with telephone service providers to route their calls through the rural carrier. These often include phone sex or free conference ca ll providers, who expect a high volume of incoming calls. A similar scenario occurs internationally, with fraudsters making setting up conference servers in third world countries and making deals with the local (often state owned) telephone company. To qualify as access stimulation or traffic pumping, a fraudster must:
Have a revenue share agreement between the terminating carrier that stimulates demand Have a 3 to 1 increase in interstate terminating to originating traffic or 100% traffic growth in a month year over year.
In this case, authorities can step in and force the terminating carrier to re-file their access tariff with the public utilities commission within 45 days. Because of the extra traffic, the terminating ca rrier would no longer be eligible
for the high access fee, and will likely be dropped from the revenue sharing agreement. However, many traffic pumpers routinely evade regulation. How to Detect Traffic Pumping Fraud
The typical call signature for traffic pumping fraud is a spike in traffic to high cost destinations. TransNexus solutions monitor Call Detail Records (CDRs) in real time. They look at five minute samples of call attempts for suspicious spikes. When a spike occurs, the solutions will send Email and SNMP fraud alerts. In addition to the alarms, TransNexus solutions may be configured to re-route calls or change outgoing dial plans. Voice Mail Hacking Fraud What is Voice Mail Hacking Telecom Fraud?
Voice mail hacking was an early form of communications fraud. It ca n happen simply and easily through the telephone network. It is a problem rampant enough that even the FCC has recently issued guidelines on how to avoid becoming a victim. Here, a hacker need only find a device with an easy-to-break password. Some voice mail systems have static or easily guessed default passwords, and users often do not change the default. Recent studies have shown that the password 1-2-3-4 constitutes nearly 5% of Voice Mail passwords – 7x the frequency of the next most common password (0-0-0-0). Criminals can easily use this straightforward technique for International Revenue Sharing Fraud (IRSF). Once they have the password to an account, it is a simple matter in many Voice Mail systems to exploit the “Call Back” feature – that feature that allows a user to immediately return a missed call. The criminal calls the phone number, leaving their IRSF number as the “call back” number. Then, they login to the account, find their missed call, and return it, signaling the Voice Mail to initiate a call to their IRSF number. Once the call is connected, a criminal can attempt to leave it up as long as possible, often hours or days. Voice Mail Hacking Fraud Call Scenario
How to Detect Voice Mail Hacking Fraud
The typical call signature for any type of IRSF is a spike in traffic to high cost destinations. Because these spikes often occur over holidays or weekends, service providers must have a monitoring and alarm system in place that will stop the fraud immediately. TransNexus solutions monitor Call Detail Records (CDRs) in real time. They look at five minute samples of call attempts for suspicious spikes. When a spike occurs, the solutions will send Email and SNMP fraud alerts. In addition to the alarms, TransNexus solutions may be configured to re-route calls or change outgoing dial plans. One Ring and Cut (Wangiri) Fraud What is One Ring and Cut (Wangiri) Telecom Fraud?
Wangiri, in Japanese, means “one and cut.” That is, one ring and a cut off phone call. A wangiri phone fraud scheme relies on this single ring method for a quick way to make money. A fraudster will set up a computer to dial a large number of phone numbers at random. Each rings just once, then hangs up. This leaves a number as a missed call on the recipients’ phone. Users often see the missed call and believe a legitimate call was cut off, or are simply curious as to who called, so they dial the missed number. The number turns out to be a premium rate number – anything from advertising to “free prizes” to sex services. There is also an SMS variant of Wangiri fraud that has been reported recently. In this variation, subscribers receive an SMS message like “Please call me back, this is urgent!” as a way to entice them to return a call. One Ring and Cut (Wangiri) Fraud Scenario
1.
The Fraudster sets up calls to voice subscribers, but hangs up after one ring. This means that the fraudster isn’t charged for making the calls.
2.
Curious subscribers see a missed call on their phones, and return the call, not realizing that the number is actually a high cost destination.
3.
If subscribers are on a flat rate plan, the service provider will be left paying high termination costs with no corresponding increase in revenue
4.
The Fraudster shares in the revenue from the fraudulent calls.
How to Detect One Ring and Cut (Wangiri) Fraud
The typical call signature for wangiri fraud is a spike in traffic to high cost destinations. TransNexus solutions monitor Call Detail Records (CDRs) in real time. They look at five minute samples of call attempts for suspicious spikes. When a spike occurs, the solutions will send Email and SNMP fraud alerts. In addition to the alarms, TransNexus solutions may be configured to re-route calls or change outgoing dial plans. Toll Bypass Fraud
What is Toll Bypass Telecom Fraud?
Bypass fraud is the unauthorized insertion of traffic onto another carrier’s network. You may also find this type of fraud referred to as Interconnect fraud, GSM Gateway fraud, or SIM Boxing. This scenario requires that the fraudsters have access to advanced technology, which is capable of making international calls appear to be cheaper, domestic calls, effectively “bypassing” the normal payment system for international calling. The fraudsters will typically sell long distance calling cards overseas. When customers call the number on the cards, operators are able to switch the call to make it seem like a domestic call.
Toll Bypass Fraud Call Scenario
1. Service provider has the choice to route a subscriber’s call to a more expensive Wholesale Provider (A) or a lower cost “Gray Market” Provider (B) A2. Service Provider routes call to Wholesale Provider A3. Wholesale Provider pays a toll to the international Legacy Telephone Company (PTT) B2. Service Provider routes call to a lower cost fraudulent wholesale provider B3. The fraudulent wholesale provider routes the call through a SIM Box
B4. The international call routed through the SIM Box to a cell tower looks like local subscriber traffic, so the fraudulent service provider pays a significantly reduced toll. Inter/Intra State Toll Bypass Fraud What is Inter/Intra State Toll Bypass Telecom Fraud?
Bypass fraud is the unauthorized insertion of traffic onto another carrier’s network. Inter/Intra State toll bypass fraud attempts to bypass the higher tolls of inter-state traffic by making it look like intra-state traffic. Inter/Intra State Toll Bypass Fraud Call Scenario
1.
Subscriber places an intra-state call
2.
Fraudulent Service Provider changes the calling number of the call so that it appears to be a less expensive inter-state call
3.
Wholesale Long Distance Provider routes call to the LEC as an inter-state call
4.
LEC completes the more expensive intra-state call, but charges for a less expensive inter-state call
Toll Free Fraud What is Toll Free Telecom Fraud?
Toll Free Fraud can affect any business that uses a toll-free number. In this scheme, a fraudster will typically make a profit sharing agreement with a CLEC. He will then use VoIP technology to make multiple calls to a toll-free number – often that of a large corporation. The CLEC will perform a dip to the SMS 800 database, and then transfer the call to another network f or termination, earning something like 1.5 cents per minute in switched originating access fees. The fraudster will then navigate the automated IVR prompts, avoiding connecting to a live operator. These calls are often left up for hours at a time and automated so multiple calls will be made at once. When large companies, like financial institutions, are targeted, they frequently don’t even notice the huge charges racked up by toll free fraud, even though they are expensive, long calls. Toll Free Telecom Fraud Scenario
1.
Fraudster makes calls to toll free customer
2.
CLEC pays for a Toll-Free Database dip
3.
CLEC routes the call to the designated Toll Free Provider
4.
Toll Free Provider completes the call to the Toll-Free customer
5.
Toll Free Customer pays the provider the service fee
6.
Toll Free Provider pays the originating access fee to the CLEC
7.
The CLEC makes a profit sharing payment to the fraudster
Wholesale SIP Trunking Fraud What Is Wholesale SIP Trunking Telecom Fraud?
Fraudulent wholesale trunking is a relatively new phenomenon, but one that is growing in popularity and difficult to detect. In this scenario, the fraudster is a ctually making money by selling wholesale trunking services, using stolen credentials to terminate the calls. The key calling signature for this type of fraud is a huge number of apparently random calls. The destinations are not particularly high cost, but neither are they cheap. Countries like Vietnam, Laos, and other middle-priced Asian countries show up often. The traffic oft en appears to be to residential numbers. TransNexus customers have reported tracing this type of fr audulent traffic coming from prepaid calling card companies operating a VoIP platform in an offshore colocation facility. Prepaid calling services are well suited to exploit this type of fraud since there are no calling numbers linked to customers. The IP address of the pr epaid calling platform is the only link to trace the fraudster. Unfortunately, geolocation cannot always be used to identify the fraudster. These services can be offered via a tunnel through the Internet that hides the true IP address of the fraudster. The public IP address of the fraudster’s calling platform could be the IP address of a hosted Virtual Private Network (VPN) service while the actual prepaid calling platform is located in a different part of the world. Wholesale SIP Trunking Fraud Scenario
0. Fraudster steals subscriber’s credentials 1.
Fraudster’s softswitch registers with service provider’s softswitch using stolen user name and password
2.
Legitimate user places a call
3.
Fraudster sends INVITE to service provider’s softswitch
4.
Softswitch routes call to international long distance destination
How to Detect Wholesale SIP Trunking Fraud
Wholesale SIP trunking fraud is often dif ficult to detect because the call patterns look similar to normal subscriber usage. For these types of fraud events, we have found that a 60-minute sample of call duration data by call source provides the best detection. By tracking the fraud score for call duration, TransNexus solutions effectively monitor the spend rate of each call source. Schemes to Defraud Subscribers Subscriber fraud can affect any phone owner. It encompasses any fraud that involves using another person’s account to make free phone calls. Subscriber fraud may be as simple as using a lost or stolen phone or SIM card. The best way to combat subscriber fraud is to educate subscribers on basic security best practices, including creating and protecting strong passwords, and carefully exa mining bills for unrecognized calling activity.
Calling Card Fraud
What is Calling Card Telecom Fraud?
Calling card fraud can happens in a number of ways. Fraudsters might call subscribers and pose as a service provider representative, and then ask for calling card numbers for verification purposes. Another common scenario is that someone watches or listens a s the subscriber punch in or read their calling card number at a payphone. How to Prevent Calling Card Fraud
Subscribers should be aware of anyone calling to request calling card verification. They should only give out their card number when placing a call through an operator. Subscribers must also be careful that no one is watching when they key in their card PIN or any other PIN. Lost or Stolen Phones and SIM Card Fraud If a criminal gains access to a subscriber’s lost or stolen phone, he will be able to gain unauthorized access to the subscriber’s network. Once recognized as a ‘bona fide’ customer, fraudsters then have access to a network and are able to carry out revenue generating schemes that can seriously damage reputation and bottom-line profits. The true impact of subscription fraud often goes unrecognized because providers mistake it for bad debt.
How to Prevent Lost or Stolen Phones and SIM Card Telecom Fraud
Subscribers should report lost or stolen equipment immediately to their service provider. Service providers can often add the lost device to the national list for lost or stolen mobile devices so that it cannot be used on their own or other service provider’s networks. Virus Auto Dialer Fraud What is Virus Auto Dialer Telecom Fraud?
An auto-dialer virus uses a subscriber’s dial-up modem and phone line to make long-distance calls without their permission. Subscribers may inadvertently acquire an auto-dialer through viruses, spyware or hackers. How to Prevent Virus Auto Dialer Fraud
Subscribers may prevent virus auto dialer fraud by using anti-virus programs and a firewall. Subscribers should be aware of their computer’s dial-up internet access and usage, and program modems to ma ke a dialing noise, so they can tell when it makes a new connection. When not in use, subscribers should unplug phone lines from their computers.
Schemes Conducted Over the Telephone
Criminals of all sorts use telephony as a tool to defraud consumers and businesses. Phone fraud is a huge category, and can cover anything from Nigerian prince style scams to identity theft to extortion. TransNexus does not offer a solution to protect against these types of fraud, though there are other solutions on the market that can. Account Takeover What is Account Takeover Telecom Fraud?
With this type of telecom fraud, the fraudster generally attacks something like a financial institution. Fraudsters will call financial institutions and maliciously impersonate another customer in order to steal the contents of an account. Pindrop Security estimates that a financial institution taking 50,000 calls per day will lose over $10 million per year to phone fraud losses. How to Prevent Account Takeover
It is not an easy task to distinguish between legitimate callers and phone fraud. One way is by using phoneprinting technology to analyze the audio content of a phone call. Pindrop Security offers solutions that measure certain characteristics of the audio signal to form a unique fingerprint for each call. In addition, they can identify the region the call originated from and determine if the call was from a landline, cell phone or specific VoIP provider. These pieces of information provide a high level of insight into caller behavior. Phoneprinting routinely identifies over 80% of inbound fraud calls to enterprise contact centers, saving millions of dollars in losses and contact center expenses a year. Telecom Denial of Service (TDOS) What is Telecom Denial of Service?
Telecom Denial of Service (TDoS) attacks are similar to traditional data network denial of service (DDoS) attacks. In a DDoS attack, unauthorized users flood a system with too many access requests, preventing legitimate users from
accessing the network. For TDoS, fraudsters make a huge number of phone calls, keeping them up for long durations, and overwhelming the capacity of an organization’s phone network. TDoS attacks can impair a voice network’s availability, but can also be used as a tool for extortion. TDoS attacks have been in the news recently as a threat to public safety, as fraudsters have taken to using TDoS attacks against hospitals, police stations, and other public services. How to Handle a Telecom Denial of Serv ice Attacks
If your organization suffers from a TDoS attack, it is important that you save as much information as possible about the attack. Save the voice recording of suspects, phone numbers, start and stop times, number of calls per hour, ANIs, and IP addresses. Retain all call logs and IP logs. After the attack, you can then use the information to file reports with the FBI’s Internet Crime Complaint Center and y our local police department.
Vishing What is Vishing Telecom Fraud?
Phishing is a form of fraud that uses email messages with phony addresses, websites or pop-up windows to gather your personal information, which can then be used for identity theft. A form of phishing that uses the telephone instead of email is known as Vishing or “Voice-Phishing.” Vishers pose as a legitimate business to attempt to gather information from someone. That information can then be used for identity theft or other forms of fraud. Vishing Call Scenario
1.
Fraudster calls the Utility Company while spoofing the ANI of a customer. The fraudster then navigates the utility’s phone system to gather customer data, especially credit balance.
2.
Fraudster calls customers who are behind on their payments while spoofing the utility company’s ANI. The fraudster, pretends to work for the utility company, and demands pay ment over the phone in order to get the customer’s credit card information.
How to Avoid Vishing
Don’t give out your personal information. Legitimate comp anies will never call or email you to request information such as passwords, bank account information or credit card numbers unless they’re responding directly to an inquiry you know you have made. To make sure you’re dealing with the real company, you can always contact us them directly. Be cautious about posting personal information on public websites, such as social networking sites. Fraudsters might use those details to gain your trust.