seon.io Open in urlscan Pro
34.242.30.186  Public Scan

URL: https://seon.io/resources/telecommunications-fraud-detection-and-prevention/
Submission: On July 11 via manual from MX — Scanned from DE

Form analysis 1 forms found in the DOM

GET /resources/

<form role="search" method="get" class="ResourcesSearchForm" action="/resources/" target="_blank">
  <div class="FilterResources">
    <label class="InputHolder">
      <input type="search" class="SearchField" placeholder="Search" value="" name="q">
    </label>
  </div>
</form>

Text Content

Powered by Cookiebot
 * Consent
 * Details
 * [#IABV2SETTINGS#]
 * About


THIS WEBSITE USES COOKIES

SEON and our social media, advertising and analytics, etc. partners use cookies
to enable our websites to remember information, to help some website
functionalities to work properly, to understand how you interact with and use
our websites and to display you content and ads that are relevant and engaging
for you. By clicking [Allow all] you consent to the use of these cookies and you
acknowledge that you read and understood our Cookie Notice.
Consent Selection
Necessary

Preferences

Statistics

Personalization and Marketing

Show details
Necessary 28

Necessary cookies make our website usable by enabling website functions. The
website functions requested by you do not work without these cookies.
Cookiebot
1
Learn more about this provider
CookieConsentStores the user's cookie consent state for the current domain
Expiry: 1 yearType: HTTP
Google
9
Learn more about this provider
oauth2_cs::#.apps.googleusercontent.comUsed for secure login to the website with
a Google account.
Expiry: SessionType: HTML
test_cookieUsed to check if the user's browser supports cookies.
Expiry: 1 dayType: HTTP
collectUsed to send data to Google Analytics about the visitor's device and
behavior. Tracks the visitor across devices and marketing channels.
Expiry: SessionType: Pixel
_dc_gtm_UA-#Used by Google Tag Manager to control the loading of a Google
Analytics script tag.
Expiry: 1 dayType: HTTP
_gaRegisters a unique ID that is used to generate statistical data on how the
visitor uses the website.
Expiry: 2 yearsType: HTTP
_ga_#Used by Google Analytics to collect data on the number of times a user has
visited the website as well as dates for the first and most recent visit.
Expiry: 2 yearsType: HTTP
_galiRegisters a unique ID that is used to generate statistical data on how the
visitor uses the website.
Expiry: 1 dayType: HTTP
_gidRegisters a unique ID that is used to generate statistical data on how the
visitor uses the website.
Expiry: 1 dayType: HTTP
G_ENABLED_IDPSUsed for secure login to the website with a Google account.
Expiry: 2913733 daysType: HTTP
LinkedIn
1
Learn more about this provider
li_gcStores the user's cookie consent state for the current domain
Expiry: 2 yearsType: HTTP
New Relic
1
Learn more about this provider
JSESSIONIDPreserves users states across page requests.
Expiry: SessionType: HTTP
Wistia
2
Learn more about this provider
loglevelMaintains settings and outputs when using the Developer Tools Console on
current session.
Expiry: PersistentType: HTML
undefinedCollects data on visitor interaction with the website's video-content -
This data is used to make the website's video-content more relevant towards the
visitor.
Expiry: PersistentType: HTML
app.emailage.com
2
AWSALBRegisters which server-cluster is serving the visitor. This is used in
context with load balancing, in order to optimize user experience.
Expiry: 7 daysType: HTTP
AWSALBCORSRegisters which server-cluster is serving the visitor. This is used in
context with load balancing, in order to optimize user experience.
Expiry: 6 daysType: HTTP
g2.com
1
events_distinct_idSets a unique ID for the session. This allows the website to
obtain data on visitor behaviour for statistical purposes.
Expiry: SessionType: HTTP
g2.com
images.g2crowd.com
api.hubspot.com
vimeo.com

4
__cf_bm [x4]This cookie is used to distinguish between humans and bots. This is
beneficial for the website, in order to make valid reports on the use of their
website.
Expiry: 1 dayType: HTTP
play.google.com
youtube.com

2
CONSENT [x2]Used to detect if the visitor has accepted the marketing category in
the cookie banner. This cookie is necessary for GDPR-compliance of the website.
Expiry: 2 yearsType: HTTP
seon.io
5
bulkTimePending
Expiry: PersistentType: HTML
dataPending
Expiry: 1 yearType: HTTP
SESS#Preserves users states across page requests.
Expiry: 1 yearType: HTTP
testingThis cookie determines whether the browser accepts cookies.
Expiry: 1 dayType: HTTP
wistiaUsed by the website to track the visitor's use of video-content - The
cookie roots from Wistia, which provides video-software to websites.
Expiry: PersistentType: HTML
Preferences 7

Preferences cookies enable our website to remember information that changes the
way the website behaves or looks, like your preferred language or the region
that you are in.
Acast
1
Learn more about this provider
AcastLangThis cookie is used to determine the preferred language of the visitor
and sets the language accordingly on the website, if possible.
Expiry: PersistentType: HTML
Hubspot
1
Learn more about this provider
messagesUtkStores a unique ID string for each chat-box session. This allows the
website-support to see previous issues and reconnect with the previous
supporter.
Expiry: 179 daysType: HTTP
LinkedIn
2
Learn more about this provider
lang [x2]Remembers the user's selected language version of a website
Expiry: SessionType: HTTP
Wistia
1
Learn more about this provider
wistia-video-progress-#Contains a timestamp for the website’s video-content.
This allows the user to resume watching without having to start over, if the
user leaves the video or website.
Expiry: PersistentType: HTML
demo.arcade.software
1
intercom.intercom-stateStores a unique ID string for each chat-box session. This
allows the website-support to see previous issues and reconnect with the
previous supporter.
Expiry: PersistentType: HTML
seon.io
1
currencySaves the visitor's currency preferences.
Expiry: 6 daysType: HTTP
Statistics 22

Statistics cookies help us to understand how you interact with and use our
website by collecting and reporting statistical or analytics information.
Hotjar
8
Learn more about this provider
_hjAbsoluteSessionInProgressThis cookie is used to count how many times a
website has been visited by different visitors - this is done by assigning the
visitor an ID, so the visitor does not get registered twice.
Expiry: 1 dayType: HTTP
_hjFirstSeenThis cookie is used to determine if the visitor has visited the
website before, or if it is a new visitor on the website.
Expiry: 1 dayType: HTTP
_hjIncludedInPageviewSampleUsed to detect whether the user navigation and
interactions are included in the website’s data analytics.
Expiry: 1 dayType: HTTP
_hjIncludedInSessionSampleRegisters data on visitors' website-behaviour. This is
used for internal analysis and website optimization.
Expiry: 1 dayType: HTTP
_hjRecordingLastActivitySets a unique ID for the session. This allows the
website to obtain data on visitor behaviour for statistical purposes.
Expiry: SessionType: HTML
_hjSession_#Collects statistics on the visitor's visits to the website, such as
the number of visits, average time spent on the website and what pages have been
read.
Expiry: 1 dayType: HTTP
_hjSessionUser_#Collects statistics on the visitor's visits to the website, such
as the number of visits, average time spent on the website and what pages have
been read.
Expiry: 1 yearType: HTTP
hjViewportIdSets a unique ID for the session. This allows the website to obtain
data on visitor behaviour for statistical purposes.
Expiry: SessionType: HTML
Hubspot
4
Learn more about this provider
__hsscIdentifies if the cookie data needs to be updated in the visitor's
browser.
Expiry: 1 dayType: HTTP
__hssrcUsed to recognise the visitor's browser upon reentry on the website.
Expiry: SessionType: HTTP
__hstcSets a unique ID for the session. This allows the website to obtain data
on visitor behaviour for statistical purposes.
Expiry: 179 daysType: HTTP
hubspotutkSets a unique ID for the session. This allows the website to obtain
data on visitor behaviour for statistical purposes.
Expiry: 179 daysType: HTTP
LinkedIn
1
Learn more about this provider
AnalyticsSyncHistoryUsed in connection with data-synchronization with
third-party analysis service.
Expiry: 29 daysType: HTTP
Microsoft
5
Learn more about this provider
c.gifCollects data on the user’s navigation and behavior on the website. This is
used to compile statistical reports and heatmaps for the website owner.
Expiry: SessionType: Pixel
CLIDCollects data on the user’s navigation and behavior on the website. This is
used to compile statistical reports and heatmaps for the website owner.
Expiry: 1 yearType: HTTP
_clckCollects data on the user’s navigation and behavior on the website. This is
used to compile statistical reports and heatmaps for the website owner.
Expiry: 1 yearType: HTTP
_clskRegisters statistical data on users' behaviour on the website. Used for
internal analytics by the website operator.
Expiry: 1 dayType: HTTP
_cltkRegisters statistical data on users' behaviour on the website. Used for
internal analytics by the website operator.
Expiry: SessionType: HTML
New Relic
2
Learn more about this provider
events/1/#Used to monitor website performance for statistical purposes.
Expiry: SessionType: Pixel
jserrors/1/#Pending
Expiry: SessionType: Pixel
Twitter Inc.
1
Learn more about this provider
personalization_idThis cookie is set by Twitter - The cookie allows the visitor
to share content from the website onto their Twitter profile.
Expiry: 2 yearsType: HTTP
demo.arcade.software
1
ajs_anonymous_idThis cookie is used to count how many times a website has been
visited by different visitors - this is done by assigning the visitor an ID, so
the visitor does not get registered twice.
Expiry: PersistentType: HTML
Personalization and Marketing 42

Personalization and Marketing cookies are used to track you on our website or
across websites and devices, and to display you content and ads that are
relevant and engaging for you on our websites or third-party websites, including
on social media.
Meta Platforms, Inc.
1
Learn more about this provider
_fbpUsed by Facebook to deliver a series of advertisement products such as real
time bidding from third party advertisers.
Expiry: 3 monthsType: HTTP
Google
7
Learn more about this provider
IDEUsed by Google DoubleClick to register and report the website user's actions
after viewing or clicking one of the advertiser's ads with the purpose of
measuring the efficacy of an ad and to present targeted ads to the user.
Expiry: 1 yearType: HTTP
pagead/landing [x2]Collects data on visitor behaviour from multiple websites, in
order to present more relevant advertisement - This also allows the website to
limit the number of times that they are shown the same advertisement.
Expiry: SessionType: Pixel
ads/ga-audiencesUsed by Google AdWords to re-engage visitors that are likely to
convert to customers based on the visitor's online behaviour across websites.
Expiry: SessionType: Pixel
NIDRegisters a unique ID that identifies a returning user's device. The ID is
used for targeted ads.
Expiry: 6 monthsType: HTTP
pagead/1p-user-list/#Tracks if the user has shown interest in specific products
or events across multiple websites and detects how the user navigates between
sites. This is used for measurement of advertisement efforts and facilitates
payment of referral-fees between websites.
Expiry: SessionType: Pixel
_gcl_auUsed by Google AdSense for experimenting with advertisement efficiency
across websites using their services.
Expiry: 3 monthsType: HTTP
Hotjar
1
Learn more about this provider
_hjRecordingEnabledThis cookie is used to identify the visitor and optimize
ad-relevance by collecting visitor data from multiple websites – this exchange
of visitor data is normally provided by a third-party data-center or
ad-exchange.
Expiry: SessionType: HTML
Hubspot
1
Learn more about this provider
__ptq.gifSends data to the marketing platform Hubspot about the visitor's device
and behaviour. Tracks the visitor across devices and marketing channels.
Expiry: SessionType: Pixel
LinkedIn
5
Learn more about this provider
bcookieUsed by the social networking service, LinkedIn, for tracking the use of
embedded services.
Expiry: 2 yearsType: HTTP
bscookieUsed by the social networking service, LinkedIn, for tracking the use of
embedded services.
Expiry: 2 yearsType: HTTP
li_sugrCollects data on user behaviour and interaction in order to optimize the
website and make advertisement on the website more relevant.
Expiry: 3 monthsType: HTTP
lidcUsed by the social networking service, LinkedIn, for tracking the use of
embedded services.
Expiry: 1 dayType: HTTP
UserMatchHistoryUsed to track visitors on multiple websites, in order to present
relevant advertisement based on the visitor's preferences.
Expiry: 29 daysType: HTTP
Meta Platforms, Inc.
1
Learn more about this provider
trUsed by Facebook to deliver a series of advertisement products such as real
time bidding from third party advertisers.
Expiry: SessionType: Pixel
Microsoft
9
Learn more about this provider
MUID [x2]Used widely by Microsoft as a unique user ID. The cookie enables user
tracking by synchronising the ID across many Microsoft domains.
Expiry: 1 yearType: HTTP
SRM_BTracks the user’s interaction with the website’s search-bar-function. This
data can be used to present the user with relevant products or services.
Expiry: 1 yearType: HTTP
ANONCHKRegisters data on visitors from multiple visits and on multiple websites.
This information is used to measure the efficiency of advertisement on websites.
Expiry: 1 dayType: HTTP
SMRegisters a unique ID that identifies the user's device during return visits
across websites that use the same ad network. The ID is used to allow targeted
ads.
Expiry: SessionType: HTTP
_uetsidCollects data on visitor behaviour from multiple websites, in order to
present more relevant advertisement - This also allows the website to limit the
number of times that they are shown the same advertisement.
Expiry: 1 dayType: HTML
_uetsid_expContains the expiry-date for the cookie with corresponding name.
Expiry: PersistentType: HTML
_uetvidUsed to track visitors on multiple websites, in order to present relevant
advertisement based on the visitor's preferences.
Expiry: 1 yearType: HTML
_uetvid_expContains the expiry-date for the cookie with corresponding name.
Expiry: PersistentType: HTML
Twitter Inc.
4
Learn more about this provider
i/adsct [x2]The cookie is used by Twitter.com in order to determine the number
of visitors accessing the website through Twitter advertisement content.
Expiry: SessionType: Pixel
muc_adsCollects data on user behaviour and interaction in order to optimize the
website and make advertisement on the website more relevant.
Expiry: 2 yearsType: HTTP
i/jotSets a unique ID for the visitor, that allows third party advertisers to
target the visitor with relevant advertisement. This pairing service is provided
by third party advertisement hubs, which facilitates real-time bidding for
advertisers.
Expiry: SessionType: Pixel
YouTube
10
Learn more about this provider
VISITOR_INFO1_LIVETries to estimate the users' bandwidth on pages with
integrated YouTube videos.
Expiry: 179 daysType: HTTP
YSCRegisters a unique ID to keep statistics of what videos from YouTube the user
has seen.
Expiry: SessionType: HTTP
ytidb::LAST_RESULT_ENTRY_KEYStores the user's video player preferences using
embedded YouTube video
Expiry: PersistentType: HTML
yt-remote-cast-availableStores the user's video player preferences using
embedded YouTube video
Expiry: SessionType: HTML
yt-remote-cast-installedStores the user's video player preferences using
embedded YouTube video
Expiry: SessionType: HTML
yt-remote-connected-devicesStores the user's video player preferences using
embedded YouTube video
Expiry: PersistentType: HTML
yt-remote-device-idStores the user's video player preferences using embedded
YouTube video
Expiry: PersistentType: HTML
yt-remote-fast-check-periodStores the user's video player preferences using
embedded YouTube video
Expiry: SessionType: HTML
yt-remote-session-appStores the user's video player preferences using embedded
YouTube video
Expiry: SessionType: HTML
yt-remote-session-nameStores the user's video player preferences using embedded
YouTube video
Expiry: SessionType: HTML
demo.arcade.software
1
ajs_user_idCollects data on visitors' preferences and behaviour on the website -
This information is used make content and advertisement more relevant to the
specific visitor.
Expiry: PersistentType: HTML
seon.io
2
__mpq_#_#Collects data on user behaviour and interaction in order to optimize
the website and make advertisement on the website more relevant.
Expiry: PersistentType: HTML
mp_#_mixpanelPending
Expiry: 1 yearType: HTTP
Functional 4
Functional cookies are used to ensure the proper functioning of our website.
g2.com
1
_g2_session_idPending
Expiry: SessionType: HTTP
seon.io
3
bulkPagePending
Expiry: PersistentType: HTML
bulkSecretPending
Expiry: PersistentType: HTML
preact-i18nPending
Expiry: PersistentType: HTML
Cross-domain consent[#BULK_CONSENT_DOMAINS_COUNT#] [#BULK_CONSENT_TITLE#]
List of domains your consent applies to: [#BULK_CONSENT_DOMAINS#]
Cookie declaration last updated on 20.06.22 by Cookiebot


[#IABV2_TITLE#]

[#IABV2_BODY_INTRO#]
[#IABV2_BODY_LEGITIMATE_INTEREST_INTRO#]
[#IABV2_BODY_PREFERENCE_INTRO#]
[#IABV2_LABEL_PURPOSES#]
[#IABV2_BODY_PURPOSES_INTRO#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_LABEL_FEATURES#]
[#IABV2_BODY_FEATURES_INTRO#]
[#IABV2_BODY_FEATURES#]
[#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PARTNERS_INTRO#]
[#IABV2_BODY_PARTNERS#]

Scope. This cookie notice (“Cookie Notice”) provides you with information on how
SEON Technologies Kft. (“SEON” or “we”) and our social media advertising,
analytics, etc. partners use cookies on seon.io and docs.seon.io.

 

Cookies. Cookies are small text files that are sent to your device by the
browser upon request of the websites. When this notice mentions cookies it
should be understood to include similar technologies (e.g. pixel tags, web
beacons, local storage, etc.). The cookies that we provide or set on your device
while you are visiting our websites are called first party cookies. The cookies
that our partners provide or set on your device are third party cookies. Each
cookie lasts for a different period of time. Session cookies will last only
while your browser is open. When you close the browser, this cookie will be
deleted automatically. Persistent cookies will survive even after closing the
browser. For example, we will recognize your device via these cookies when you
open the browser again.

 

Further information about cookies. Learn more about the purposes of cookies, the
duration of the operation of cookies, our social media, advertising, analytics,
etc. partners that use cookies on our websites under “Details”.

 

Data collected about you. We and our partners process the cookie ID and related
data such as information about your device, the functioning of our website, your
preferences etc. Please note that normally we are not able to identify you based
on these data, therefore they are normally not considered personal data. If, on
the basis of specific circumstances, we are able to identify you based on these
data, we inform you that we process your personal data in accordance with our
Privacy Notice.

 

Recipients. SEON shares the cookie ID and related data with the following
recipients: cloud providers, customer relationship management (CRM) providers,
integration tool providers, instant messaging providers, video conferencing tool
providers, UI/UX tool providers, social media providers, online advertising
platforms and agencies, marketing and analytics tools providers. For further
information about our data sharing practices please see our Privacy Notice.

 

Your choices. We use “Functionality and Preferences”, “Personalization and
Marketing” and “Statistics” cookies on the basis of you consent. You can at any
time, provide, change or withdraw your consent from these cookies under
“Details”. Please note that our use of “Necessary” cookies is not subject to
your consent, we use them by default, as without these cookies, our website
functions requested by you do not work.

 

Device fingerprinting. We use device fingerprinting technology for ensuring
information security of our services and for preventing frauds. For further
information please see our Privacy Notice.

 

Further information about our privacy practices. Our Privacy Notice complements
this Cookie Notice. Learn more about who we are, how you can contact us or our
data protection officer, how we process personal data, what  are your rights
regarding your personal data, and what are our data protection and privacy
practices in our Privacy Notice. 

 

[#OOI_PERSONAL_INFORMATION#]
Reject Allow selection Customize

Allow all
Powered by Cookiebot by Usercentrics

 * Products
   
   --------------------------------------------------------------------------------
   
   Products
   
    * SEON The anti-fraud solution loved by fraud managers.
   
    * Integrations APIs, SDKs, Zapier and integration partners.
   
    * Shopify App One-click integration for Shopify.

 * Use Cases
   
   --------------------------------------------------------------------------------
   
   Use Cases
   
    * Banking & Insurance
    * iGaming & Gambling
    * Online Lending
   
    * Ecommerce
    * Travel & Ticketing
    * Buy Now Pay Later
      (BNPL)
   
    * Payment Gateways
    * Crypto & Trading

 * Resources
   
   --------------------------------------------------------------------------------
   
   Resources
   
    * Articles
    * Podcasts
    * Webinars
   
    * Case Studies
    * Guides
    * Videos
   
    * Dictionary
    * Comparisons

 * Developers
   
   --------------------------------------------------------------------------------
   
   Developers
   
    * Getting Started
    * Common Fraud Problems
    * Product Overview
    * Device Fingerprinting
    * Machine Learning
    * End-to-end Fraud Prevention
   
    * Integration
    * Quick Start
    * Integration Overview
    * Integration Timeline
   
    * Knowledge Base
    * User Manual
    * Whitepapers
    * Transaction Details
   
    * API Reference
    * Fraud API
    * Email API
    * Phone API
    * IP API
    * Device Fingerprinting

 * Company
   
   --------------------------------------------------------------------------------
   
   Company
   
    * About Us
    * Mediaroom
   
    * Careers
    * Who We Work With
   
    * Contact Us
    * News

 * Pricing

Try for freeGet a demo

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

MENU

Login


--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

 * Products
   * SEON The anti-fraud solution loved by fraud managers.
   * Integrations APIs, SDKs, Zapier and integration partners.
   * Shopify appOne-click integration for Shopify.
 * Use Cases
   * Banking & Insurance
   * iGaming & Gambling Fraud
   * Online Lending
   * Ecommerce
   * Travel & Ticketing
   * Buy Now Pay Later
     (BNPL)
   * Payment Gateways
   * Crypto & Trading
 * Resources
   * Articles
   * Podcasts
   * Webinars
   * Case Studies
   * Guides
   * Videos
   * Dictionary
   * Comparisons
 * Developers
   * Getting Started
   * Common Fraud Problems
   * Product Overview
   * Device Fingerprinting
   * Machine Learning
   * End-to-end Fraud Prevention
   * Integration
   * Quick Start
   * Integration Overview
   * Integration Timeline
   * Knowledge Base
   * User Manual
   * Whitepapers
   * Transaction Details
   * API Reference
   * Fraud API
   * Email API
   * Phone API
   * IP API
   * Device Fingerprinting
 * Company
   * About Us
   * Mediaroom
   * Careers
   * Who We Work With
   * Contact Us
   * News
 * Pricing

Try for freeGet a demo

--------------------------------------------------------------------------------

Login

Follow Us! ThumbsUp

info@seon.io+44 20 8089 2900
© Copyright SEON Technologies Ltd. - Privacy Policy
;
 * Home
 * Resources
 * Articles


11 TYPES OF TELECOMMUNICATIONS FRAUD: HOW TO DETECT & PREVENT IT

by Tamas Kadar



Table of Contents


 * What Is Telecommunications Fraud?
 * How Does It Work?
 * 11 Types of Telecom Fraud
 * What Is Telecom Fraud Detection and Prevention?
 * Telecommunications Fraud Solutions
 * FAQ

 * What Is Telecommunications Fraud?
 * How Does It Work?
 * 11 Types of Telecom Fraud
 * What Is Telecom Fraud Detection and Prevention?
 * Telecommunications Fraud Solutions
 * FAQ

Historically, telecommunications companies have been slow to deploy RiskOps
departments. Losses were either absorbed or passed on to the repo business. 

But telecom operators are increasingly inclined to meet their unique fraud
challenges head-on.

Let’s examine them in detail here and see what kind of tools can help.


WHAT IS TELECOMMUNICATIONS FRAUD?

Telecommunications fraud, also known as telco fraud or telecom fraud, includes
any kind of activity designed to abuse and gain an advantage over
telecommunications companies using deception (fraudulent practices). 

This includes IRSF fraud (International Revenue Sharing Fraud), where fraudsters
abuse premium phone rates, and interconnect bypass fraud, a form of arbitrage
between operators’ call rates.


HOW DOES TELECOMMUNICATIONS FRAUD WORK?

Because telephony is the largest and oldest deployed network in the world,
accounting for 48% of the worldwide consumer electronics revenue, fraudsters
have long developed tools and practices to exploit it to extract value.

And while fraud attacks usually evolve quickly over time as companies squash
them, telco fraud is unique as it’s often taken as a given. Its costs are
absorbed by operators, who would rather not embark on integrating complex risk
management systems into their architectures.

Adding to the challenge is the fact that telecom companies also break down their
services to resell them to local networks and carriers – a £4/$5 billion
industry in the UK alone.

As the technology to run your own mobile network becomes more widely available,
large telecom operators are becoming targets of fraud indirectly, making it
harder to identify.

Worried about Telecom Fraud?

Protect your business with SEON’s advanced real time fraud fighting tools to
keep you and your customers secure

Book a Demo


11 TYPES OF TELECOMMUNICATIONS FRAUD

Let’s now look at the most common types of telco fraud attacks operators should
know about.


1. INTERNATIONAL REVENUE SHARING FRAUD (IRSF)

International Revenue Sharing Fraud, or IRSF fraud, takes advantage of premium
phone rates, which are then dialed unwittingly by users.

It is by far the biggest fraud challenge for telecom operators, costing the
industry an estimated $4 to $6.1 billion a year. This is how it works:

 1. Bad agents sign up to lease a premium phone number.
 2. They break into a business’s phone systems and make calls to that number.
 3. The business pays as much as $1 a minute, 25% of which goes into the
    fraudster’s pockets.

Businesses may suddenly find themselves with astronomical phone bills for calls
they do not recognize. The calls often happen outside of working hours and
companies only realize they’ve been made when it’s time to foot the bill.

It doesn’t help that regulation is lacking in this area. Unlike with card
payments, where the chargeback process can protect the person whose credit card
was stolen, there is no such thing in the telephony world. 


2. INTERCONNECT BYPASS FRAUD

Interconnect bypass fraud, also known as SIM box fraud, takes advantage of
something called a termination rate to make cheaper phone calls. It is estimated
to cost telecom operators $2.7 billion in lost revenue per year.

To understand it, let’s look at a scenario with two operators in different
countries:

 1. A customer of Operator A calls a customer of Operator B. 
 2. Operator A charges its customer a fee per minute. 
 3. Operator B charges Operator A a fee for providing the call to its customer.

That last charge, where the call terminates, is the termination rate. These
rates vary wildly depending on the contracts between the two operators. Some of
them are expensive, others are close to 0. 

This is where a fraudulent operator comes into the picture. They reroute these
international calls using a SIM box or GSM gateway, effectively hijacking the
connection to achieve cheaper termination rates. They are essentially making
long-distance calls much cheaper, but the caller pays the same price – so the
fraudster telco pocketss the difference.

This also impacts telecom customer satisfaction because more often than not, the
quality of these calls will be inferior to standard international calls.




3. TELECOM ARBITRAGE FRAUD

Arbitrage is the general practice of capitalizing on price differences. In the
telco world, these differences appear in the long-distance rates between
countries.

Just like with international bypass fraud, it can lower the international cost
for customers, but also open the door to fraudulent companies who insert
themselves between operators. They claim to connect directly from country A to
B, whereas, in fact, they go through a cheaper rate country to connect the call.


4. PBX HACKING

PBX hacking allows fraudsters to take control of phone lines by exploiting
unsecured phone networks.

A PBX (private branch exchange) is a private phone network that connects to
external networks. It’s what allows companies to share lines and to reduce the
number of numbers needed in an office, for instance. 

Because a lot of these PBX are IP-based, they can be an easy target for hackers.
They will log into the system and use it to their advantage – for instance for
instances of IRSF fraud mentioned above. This is a cybersecurity and IT issue
that can be avoided with better internal controls and password security.


5. TRAFFIC PUMPING

Traffic pumping, also known as access stimulation, is a practice where
unscrupulous local exchanges cook the numbers of calls to their networks to
benefit from compensation fees set up by the US FCC.

Under the Telecommunications Act of 1996, big telcos such as Sprint, Verizon,
and AT&T have to pay fees to rural carriers – so these carriers do everything in
their power to boost the number of calls to get larger payouts.


6. DEPOSIT FRAUD

Essentially a type of credit card fraud, deposit fraud targets telecom
operators’ online stores using stolen credit card numbers. Fraudsters usually
purchase prepaid SIMs, but the same technique applies to devices (smartphones,
routers, etc.).

The problem, of course, is that online telecom stores are responsible for
refunding the fees in the form of chargebacks. You could, of course, rely on
your payment processor to reduce these rates or deploy chargeback-guarantee
fraud prevention tools, but this does make your company vulnerable to high rates
of false positives – where legitimate customers are prevented from making a
purchase.

There’s also a growing threat in the form of 4G proxy networks, a practice
that’s been booming in recent years, both for legitimate business and
residential use cases. 

Unfortunately, fraudsters also purchase SIM cards and USB dongles en masse to
create their own residential mobile network. While services like Proxidize claim
to cut costs and offer higher speeds, they also allow fraudsters to launch more
attacks by generating and controlling IP addresses. 


7. SUBSCRIPTION FRAUD

Subscription fraud in the telephony world sees criminals sign up for contracts
using stolen IDs and stolen credit card numbers.

Phone contracts are harder for fraudsters to purchase than items because they
involve a form of KYC check. That is to say, you need to verify the user’s
identity before they can subscribe.

Fraudsters love high-end smartphones they can acquire through contracts. It’s a
simple case of submitting fake IDs, jailbreaking the device, and reselling it on
second-hand markets. By the time the repo company comes, it realizes the person
does not exist.

So how do they pass the KYC checks? That’s barely an inconvenience for identity
fraud experts. They have a large pool of stolen identities to choose from,
acquired via phishing techniques, bought on the dark web, or rented out from ID
mules. 

It should be noted that in-store purchases tend to have a higher risk rate than
shipping. While fraudsters have plenty of options for acquiring drop addresses
(where they receive items not tied to their real identities), it’s much easier
for them to walk in and pick up the devices in person.


8. ACCOUNT TAKEOVER

Telecom companies who offer online user accounts can be victims of ATO attacks,
where fraudsters find the login and password details of other users and sign in
in their place.

If your online store lets users create accounts, chances are fraudsters are
ready to steal them – regardless of what you sell. It is expensive, as Javelin
estimates it costs a business an average of $263 to recover a user’s account,
not to mention how it can damage your business reputation.

The point is that you need to have systems in place to authenticate user logins
to ensure you are indeed allowing the right people into your store. 


9. SMISHING/SMS PHISHING

Smishing, also known as SMS phishing, is the practice of sending mass SMS in
order to obtain personal information from the person who receives the messages.

Mass spam campaigns are the bane of customers’ and telcos’ existence. This is
why SMS phishing rings have become adept at avoiding detection. They’ve been
known to use software to confirm the numbers they target are mobiles and not
landlines (so telcos don’t notice red flags), create auto-shops to resell the
stolen details, and even provide their own hosting services to host phishing
sites and marketplaces. 

The volume of social engineering attacks that take the form of smishing
skyrocketed by more than 328% in 2020 and while telco operators don’t always
take the fall for it, they should feel uncomfortable knowing that they are
accidentally complicit in the practice (and it potentially affects their
reputation, too)

A simple system for monitoring signups and transactions coming from the B2B
service should be enough to ensure your telco company isn’t helping a smishing
business.  


10. WANGIRI FRAUD

From the Japanese meaning “one and cut”, wangiri telecommunications fraud
involves striking curiosity in customers by calling them, letting the phone ring
once, and hanging up. The customer will often ring back, unwillingly calling an
expensive premium number that the fraudsters control. 



An SMS variant of this also exists, where fraudsters send a message prompting
customers to call back a certain number, or even text it. The typical red flags
for this kind of telecommunications fraud are spikes in traffic to high-cost
destinations, which telcos should be able to monitor with their internal
systems.

The key here is to know that, as a business, you should keep an eye on which
numbers are automatically dialed. This isn’t only for telcos, by the way: Any
company where phone calls are an important part of finding leads or customer
service could do well to deploy a simple reverse phone lookup tool to protect
themselves whenever someone is asked to dial back an unknown number.


11. SIM JACKING AND SIM SWAPPING

Also known as SIM swapping, SIM jacking sees fraudsters take control of a
person’s SMS messages and phone calls by switching a phone number to another
they are in control of.

As more and more companies, such as banks, use OTP (one-time passwords) and 2FA
(2-factor verification) delivered in the format of text messages or phone calls,
fraudsters are attempting to take control of people’s phone numbers in order to
intercept them.

The way they do it is via a form of account takeover called SIM jacking or SIM
swapping (which you can read more about in our fraud trends 2021 post)

The fraudster will contact the telco’s customer service and ask to transfer
their number to a new SIM, which they control. When the procedure is complete,
they can receive all the OTPs and SMS verifications needed to hijack customer
accounts, from social media to fintech apps.

Telco operators have become much better at mitigating this kind of risk in the
last few years, simply by deploying their own multi-factor authentication (MFA)
systems to confirm if the user legitimately requested a number change.


WHAT IS TELECOMMUNICATIONS FRAUD DETECTION AND PREVENTION?

Telecommunications fraud detection and prevention is a broad term that covers
any kind of technique or strategy put in place to reduce criminal actions
designed to take advantage of telco operators.

Telecommunications fraud detection and prevention should target three key areas:

 * vetting and filtering out bad resellers
 * protecting business revenue
 * ensuring users and customers are really who they say they are

It is with the third area that SEON can help, thanks in part to technology such
as data enrichment, device fingerprinting, and machine-learning suggestions.


WHAT TO LOOK OUT FOR IN TELECOMMUNICATIONS FRAUD IN 2022 AND BEYOND

Telecommunications fraud is always evolving. However, we have recently witnessed
a rise in key attack vectors, including:

 * Fake and synthetic IDs: Fraudsters have access to an increasingly wide range
   of options to source ID documents, either via phishing or rent-an-ID service.
   Detection has become a lot more challenging because parts of synthetic IDs
   are legitimate.
 * Virtual SIM cards: While eSIMs – virtual SIM cards – are more secure by
   virtue of being less easy to clone or steal, virtual SIMs are nonetheless
   prone to malware and social engineering attacks.
 * Social engineering attacks: The pandemic has greatly amplified the frequency
   and sophistication of phishing attacks, be they via SMS, calls, social
   engineering, or even using deepfake technology. This includes more
   personalized instances such as CEO fraud and spear-phishing attempts.


SOLUTIONS FOR TELECOMMUNICATIONS FRAUD

Fraudsters are adept at evading identification. They will use stolen IDs and
card numbers and deploy every possible tactic possible to hide their real-life
identities and intentions. This is true whether your telecommunications business
is dealing with an online store customer or a local carrier. 

With SEON, you can learn as much as possible about who you’re dealing with, with
as little friction as possible.

In the context of telecommunications fraud prevention that means deploying
frictionless, invisible, and efficient tools to aggregate info without
disturbing the customer experience of your telco business customers.

The results? Smoother business operations, and reduced rates of account
takeover, transaction fraud, and ID fraud – all thanks to a powerful
machine-learning driven engine and full risk management control.

Reduce fraud by up to 96%

Partner with SEON to reduce fraud rates in your business with real time data
enrichment and advanced APIs

Book a Demo


TELECOMMUNICATIONS FRAUD FAQ

What are the major categories of telecommunication fraud?

The most costly fraud attacks for telecommunication companies include IRSF
(international revenue share fraud), bypass fraud, and traffic pumping.

How is telecommunications fraud detected?

Fraudulent attacks such as account takeover, transaction fraud, and subscription
fraud targeting telecommunications operators can be detected with real-time
monitoring, digital footprinting and data enrichment. This allows companies to
learn more about users in order to accept or decline their actions, such as a
payment or login.

You might also be interested in reading about:

 * SEON: 5 Fraud Trends We’ll Be Keeping an Eye On in 2021
 * SEON: Virtual SIM Cards: What They Are & How Fraudsters Use Them
 * SEON: Fraud Detection & Prevention: What It Is & How to Choose a Solution
 * SEON: IP Fraud Score: How IP Analysis Works for Fraud Detection

Learn more about:

Data Enrichment | Browser Fingerprinting | Device Fingerprinting | Fraud
Detection API | Fraud Detection with Machine Learning & AI

Sources used for this article:

 * Telephony Report 2020: Telephony Report 2020
 * IBISWorld: Telecommunications Resellers in the UK – Market Research Report
 * ZDNet: Phone fraudsters are stealing billions each year through a scheme
   known as IRSF
 * Javelin: Identity Fraud Hits Record High with 15.4 Million U.S. Victims in
   2016
 * Proofpoint: Mobile Phishing Increases More Than 300% as 2020 Chaos Continues
 * Infosys BPM Podcast: Emerging Telecom Fraud Trends


SHARE ARTICLE


ARTICLES

Showing all post with `` tag


Blog


ONLINE PAYMENT METHOD FRAUD: FIGURES & STATS

by Gergo Varga
Exactly how prevalent is payment method fraud and who is most affected?
Blog


BANKING KYC: HOW IT WORKS AND HOW TO SAVE COSTS

by Jimmy Fong
See how you can streamline your KYC process for banking.
Blog


HOW TO IMPROVE AML IN IGAMING

by Jimmy Fong
iGaming companies provide perfect conditions for money laundering – how can you
stop it?
Blog


APPLICATION FRAUD: 5 TIPS TO DETECT AND PREVENT IT

by Tamas Kadar
Learn about application fraud and how to detect it with minimum friction.
Blog


UNDERSTANDING PAYMENT FRAUD IN IGAMING

by Gergo Varga
How can we solve the problem of payment fraud in iGaming?



SEE A LIVE DEMO OF OUR PRODUCT

Click here



TAMAS KADAR

CEO

Tamas is the founder and CEO of SEON and an expert in all the technological
aspects of fraud prevention.

TAGS

Risk Ops Telco Fraud Understanding Fraud Prevention

--------------------------------------------------------------------------------


SEON RESOURCES



ARTICLES

193



PODCASTS

35



WEBINARS

26



CASE STUDIES

21



VIDEOS

40



DICTIONARY

46



GUIDES

23



COMPARISONS

47


GET OUR LATEST NEWSLETTER

Join over 6000 companies in getting the latest fraud-fighting tips



Fraud Fighters

e: info@seon.io

p: +44 20 8089 2900

Contact Us


4.7 4.9


--------------------------------------------------------------------------------

Navigation

 * Home
 * Products
 * Use Cases
 * Pricing
 * Integration
 * API Status
 * Resources
 * Request Demo
 * FAQ

Menu

 * Developers
 * Events
 * Careers
 * Contact Us
 * About
 * Login

Social

 * 
 * 
 * 
 * 
 * 

© Copyright SEON Technologies Ltd. - Privacy Policy
Made with    in Budapest, London, Austin & Jakarta