SlideShare a Scribd company logo
1 of 11
Contemporary
Telco Frauds
BY: FAHAD HUSSAIN
Telecommunications Fraud?
Telecommunications fraud also known as telco fraud or telecom fraud.
Telecommunications fraud represents a serious threat to the telecommunication industry. It refers to
the abuse of telecom products or services with the intention of illegally acquiring money from a
communication service provider or its customers.
It includes any kind of action intended to abuse and gain a benefit over telecommunications
businesses using fraudulent practices.
How Does Telecommunications
Fraud Work?
Fraud attacks usually evolve quickly over time as companies squash them, telco fraud is unique as it’s
often taken as a given. Its costs are absorbed by operators, who would rather not embark on
integrating complex risk management systems into their architectures.
There are several ways that fraudulent calls/messages and data usage occur. These include providing
unrestricted access for making outbound calls/SMS, contracting with a fraudulent individual/business
or agreeing to standard post payment terms, which provides the scammer with unlimited credit until
detected.
Types of Telecommunications Fraud
Seven key fraud trends have been identified that telcos should take into account when planning
their fraud management strategy .
1. A2P Traffic Fraud
2. Grey Traffic Fraud
3. International Revenue Sharing Fraud
4. Telecom Arbitrage Fraud
5. Subscription Fraud
6. Account Takeover
7. Wangiri Fraud
A2P Traffic Fraud
Illegal SMS routing to the mobile operator’s
network.
International SMS traffic can be routed through the connection points of several transit operators,
where each operator charges a fee for SMS termination.
Illegal SMS routing bypasses the agreed connection points, which is fraudulent.
SMS aggregators receiving traffic from OTT services can use illegal routes to terminate SMS on the
networks of mobile operators
The receiving SMS operator loses income, since it does not charge a mobile termination fee.
SMS Bypass fraud leads to downtime of the operator’s active network, where the planned volume of
SMS traffic does not come to the network
Grey Traffic Fraud
Calls from foreign countries are brought in the country
as local calls while using illegal means
One of the most successful telecom fraud is “Grey calling route” which bypasses the licensed carriers
by terminating international calls onto domestic telecom networks through unlicensed and illegal
telecom set ups.
A telecom subscriber in a foreign country originates an ISD voice call to Pakistan. To bypass charges
payable to LDI operator in Pakistan, the foreign fraudulent carrier routes the call over the internet to
an illegal voice over IP Gateway and SIMbox placed in Pakistan.
The VOIP Gateway and SIMBox utilize high speed internet connection to divert VOIP based ILD calls
through a Mobile/Fixed connection to a called party which receives an international call with a
Pakistani Mobile Number, or No Number displayed on the Handset.
International Revenue Sharing Fraud
Making unauthorized calls to premium numbers.
Using fraudulent access to an Operators network to artificially inflate traffic to numbers obtained
from an International Premium Rate Number Provider, for which payment will be received by the
Fraudster on a revenue share basis with the number provider for every minute of traffic generated
into those numbers.
Fraudster generates calls to Premium destinations while using network services like Call Forwarding
and Conferencing to generate overlapping and simultaneous calls to maximize revenues.
Fraudster continues this activity until the Network detects and blocks the number range.
Fraudster will then move to another Fraudulent access and continue calling additional numbers.
Telecom Arbitrage Fraud
General practice of capitalizing on price
differences
Telecom arbitrage is often considered to be a fraudulent activity that exploits differences in long-
distance rates between countries.
Just like international bypass fraud, it can lower the international cost for customers, but also open
the door to fraudulent companies who insert themselves between operators.
Fraudulent companies claim to connect directly from country A to B, whereas, in fact, they go
through a cheaper rate country to connect the call.
The risk of arbitrage fraud has increased due to the possibility of fraudsters earning a payout per
minute on revenue share numbers higher than the retail costs of the voice calls and SMS.
Subscription Fraud
Subscription fraud occurs when a fraudster uses their own, a stolen or a synthetic identity to obtain
mobile services or devices with no intention to pay.
As the wholesale and retail purchase cost of devices has increased over recent years, a grey market
has been created and exploited by fraudsters obtaining devices to resell for lucrative profits.
Fake subscribed SIMs are sold at a very high price in the grey market and these sims are then used in
various fraudulent and criminal activities.
Account Takeover
A form of identity theft
Telecom companies who offer online user accounts can be victims of ATO attacks, where fraudsters
find the login and password details of other users and sign in in their place.
Then the fraudster makes non-monetary changes to account details such as: Modifies personally
identifiable information
The identity thief may use your information to apply for credit, file taxes, or get medical services.
These acts can damage your credit status and cost you time and money.
Wangiri Fraud
A Japanese word meaning 'one (ring) and cut'
Wangiri telecommunications fraud involves striking curiosity in customers by calling them, letting the
phone ring once, and hanging up.
The customer will often ring back, unwillingly calling an expensive premium number that the
fraudsters control.
To the user, the CLI (caller number ID) is modified in such a way that it looks like a genuine call and
when the victim calls back, it turns out to be a premium rate service (PRS) number owned by
fraudster for which the victim is charged heavily for the calls.
The fraudster intends to keep the victim on hold to increase the billed amount.
The premium rate service provider pays the fraudster a certain share of the call revenue for each
minute of call received by the premium rate number

More Related Content

Similar to Contemporary Frauds.pptx

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays
 
Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attackijtsrd
 
Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseKelley Robinson
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxMurulidharLM1
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...Mahmoud Elmekawy
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
FraudStrike
FraudStrike FraudStrike
FraudStrike XINTEC
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloningSALMAN SHAIKH
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresPositiveTechnologies
 
(2nd edition) tellows magazine
(2nd edition) tellows magazine(2nd edition) tellows magazine
(2nd edition) tellows magazinetellows
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxSunnyRajak12
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfGiuliaAiolo
 

Similar to Contemporary Frauds.pptx (20)

Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
apidays LIVE JAKARTA - Deliver A Dynamic & Secured Buying Experience by Shara...
 
Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attack
 
Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuse
 
mobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptxmobile-phone-cloning-8886-hNyjka1.pptx
mobile-phone-cloning-8886-hNyjka1.pptx
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
3 Ways Fraudsters Compromise AP Security and Controls and How You Can Mitigat...
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
IRSF
IRSFIRSF
IRSF
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
FraudStrike
FraudStrike FraudStrike
FraudStrike
 
52 mobile phone cloning
52 mobile phone cloning52 mobile phone cloning
52 mobile phone cloning
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasures
 
(2nd edition) tellows magazine
(2nd edition) tellows magazine(2nd edition) tellows magazine
(2nd edition) tellows magazine
 
14A81A05B5
14A81A05B514A81A05B5
14A81A05B5
 
CYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptxCYBERCRIME - Copy.pptx
CYBERCRIME - Copy.pptx
 
cybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdfcybercrime-copy-221128120143-2a2ea05c.pdf
cybercrime-copy-221128120143-2a2ea05c.pdf
 

Contemporary Frauds.pptx

  • 2. Telecommunications Fraud? Telecommunications fraud also known as telco fraud or telecom fraud. Telecommunications fraud represents a serious threat to the telecommunication industry. It refers to the abuse of telecom products or services with the intention of illegally acquiring money from a communication service provider or its customers. It includes any kind of action intended to abuse and gain a benefit over telecommunications businesses using fraudulent practices.
  • 3. How Does Telecommunications Fraud Work? Fraud attacks usually evolve quickly over time as companies squash them, telco fraud is unique as it’s often taken as a given. Its costs are absorbed by operators, who would rather not embark on integrating complex risk management systems into their architectures. There are several ways that fraudulent calls/messages and data usage occur. These include providing unrestricted access for making outbound calls/SMS, contracting with a fraudulent individual/business or agreeing to standard post payment terms, which provides the scammer with unlimited credit until detected.
  • 4. Types of Telecommunications Fraud Seven key fraud trends have been identified that telcos should take into account when planning their fraud management strategy . 1. A2P Traffic Fraud 2. Grey Traffic Fraud 3. International Revenue Sharing Fraud 4. Telecom Arbitrage Fraud 5. Subscription Fraud 6. Account Takeover 7. Wangiri Fraud
  • 5. A2P Traffic Fraud Illegal SMS routing to the mobile operator’s network. International SMS traffic can be routed through the connection points of several transit operators, where each operator charges a fee for SMS termination. Illegal SMS routing bypasses the agreed connection points, which is fraudulent. SMS aggregators receiving traffic from OTT services can use illegal routes to terminate SMS on the networks of mobile operators The receiving SMS operator loses income, since it does not charge a mobile termination fee. SMS Bypass fraud leads to downtime of the operator’s active network, where the planned volume of SMS traffic does not come to the network
  • 6. Grey Traffic Fraud Calls from foreign countries are brought in the country as local calls while using illegal means One of the most successful telecom fraud is “Grey calling route” which bypasses the licensed carriers by terminating international calls onto domestic telecom networks through unlicensed and illegal telecom set ups. A telecom subscriber in a foreign country originates an ISD voice call to Pakistan. To bypass charges payable to LDI operator in Pakistan, the foreign fraudulent carrier routes the call over the internet to an illegal voice over IP Gateway and SIMbox placed in Pakistan. The VOIP Gateway and SIMBox utilize high speed internet connection to divert VOIP based ILD calls through a Mobile/Fixed connection to a called party which receives an international call with a Pakistani Mobile Number, or No Number displayed on the Handset.
  • 7. International Revenue Sharing Fraud Making unauthorized calls to premium numbers. Using fraudulent access to an Operators network to artificially inflate traffic to numbers obtained from an International Premium Rate Number Provider, for which payment will be received by the Fraudster on a revenue share basis with the number provider for every minute of traffic generated into those numbers. Fraudster generates calls to Premium destinations while using network services like Call Forwarding and Conferencing to generate overlapping and simultaneous calls to maximize revenues. Fraudster continues this activity until the Network detects and blocks the number range. Fraudster will then move to another Fraudulent access and continue calling additional numbers.
  • 8. Telecom Arbitrage Fraud General practice of capitalizing on price differences Telecom arbitrage is often considered to be a fraudulent activity that exploits differences in long- distance rates between countries. Just like international bypass fraud, it can lower the international cost for customers, but also open the door to fraudulent companies who insert themselves between operators. Fraudulent companies claim to connect directly from country A to B, whereas, in fact, they go through a cheaper rate country to connect the call. The risk of arbitrage fraud has increased due to the possibility of fraudsters earning a payout per minute on revenue share numbers higher than the retail costs of the voice calls and SMS.
  • 9. Subscription Fraud Subscription fraud occurs when a fraudster uses their own, a stolen or a synthetic identity to obtain mobile services or devices with no intention to pay. As the wholesale and retail purchase cost of devices has increased over recent years, a grey market has been created and exploited by fraudsters obtaining devices to resell for lucrative profits. Fake subscribed SIMs are sold at a very high price in the grey market and these sims are then used in various fraudulent and criminal activities.
  • 10. Account Takeover A form of identity theft Telecom companies who offer online user accounts can be victims of ATO attacks, where fraudsters find the login and password details of other users and sign in in their place. Then the fraudster makes non-monetary changes to account details such as: Modifies personally identifiable information The identity thief may use your information to apply for credit, file taxes, or get medical services. These acts can damage your credit status and cost you time and money.
  • 11. Wangiri Fraud A Japanese word meaning 'one (ring) and cut' Wangiri telecommunications fraud involves striking curiosity in customers by calling them, letting the phone ring once, and hanging up. The customer will often ring back, unwillingly calling an expensive premium number that the fraudsters control. To the user, the CLI (caller number ID) is modified in such a way that it looks like a genuine call and when the victim calls back, it turns out to be a premium rate service (PRS) number owned by fraudster for which the victim is charged heavily for the calls. The fraudster intends to keep the victim on hold to increase the billed amount. The premium rate service provider pays the fraudster a certain share of the call revenue for each minute of call received by the premium rate number