seon.io
Open in
urlscan Pro
34.242.30.186
Public Scan
URL:
https://seon.io/resources/telecommunications-fraud-detection-and-prevention/
Submission: On July 11 via manual from MX — Scanned from DE
Submission: On July 11 via manual from MX — Scanned from DE
Form analysis
1 forms found in the DOMGET /resources/
<form role="search" method="get" class="ResourcesSearchForm" action="/resources/" target="_blank">
<div class="FilterResources">
<label class="InputHolder">
<input type="search" class="SearchField" placeholder="Search" value="" name="q">
</label>
</div>
</form>
Text Content
Powered by Cookiebot * Consent * Details * [#IABV2SETTINGS#] * About THIS WEBSITE USES COOKIES SEON and our social media, advertising and analytics, etc. partners use cookies to enable our websites to remember information, to help some website functionalities to work properly, to understand how you interact with and use our websites and to display you content and ads that are relevant and engaging for you. By clicking [Allow all] you consent to the use of these cookies and you acknowledge that you read and understood our Cookie Notice. Consent Selection Necessary Preferences Statistics Personalization and Marketing Show details Necessary 28 Necessary cookies make our website usable by enabling website functions. The website functions requested by you do not work without these cookies. Cookiebot 1 Learn more about this provider CookieConsentStores the user's cookie consent state for the current domain Expiry: 1 yearType: HTTP Google 9 Learn more about this provider oauth2_cs::#.apps.googleusercontent.comUsed for secure login to the website with a Google account. Expiry: SessionType: HTML test_cookieUsed to check if the user's browser supports cookies. Expiry: 1 dayType: HTTP collectUsed to send data to Google Analytics about the visitor's device and behavior. Tracks the visitor across devices and marketing channels. Expiry: SessionType: Pixel _dc_gtm_UA-#Used by Google Tag Manager to control the loading of a Google Analytics script tag. Expiry: 1 dayType: HTTP _gaRegisters a unique ID that is used to generate statistical data on how the visitor uses the website. Expiry: 2 yearsType: HTTP _ga_#Used by Google Analytics to collect data on the number of times a user has visited the website as well as dates for the first and most recent visit. Expiry: 2 yearsType: HTTP _galiRegisters a unique ID that is used to generate statistical data on how the visitor uses the website. Expiry: 1 dayType: HTTP _gidRegisters a unique ID that is used to generate statistical data on how the visitor uses the website. Expiry: 1 dayType: HTTP G_ENABLED_IDPSUsed for secure login to the website with a Google account. Expiry: 2913733 daysType: HTTP LinkedIn 1 Learn more about this provider li_gcStores the user's cookie consent state for the current domain Expiry: 2 yearsType: HTTP New Relic 1 Learn more about this provider JSESSIONIDPreserves users states across page requests. Expiry: SessionType: HTTP Wistia 2 Learn more about this provider loglevelMaintains settings and outputs when using the Developer Tools Console on current session. Expiry: PersistentType: HTML undefinedCollects data on visitor interaction with the website's video-content - This data is used to make the website's video-content more relevant towards the visitor. Expiry: PersistentType: HTML app.emailage.com 2 AWSALBRegisters which server-cluster is serving the visitor. This is used in context with load balancing, in order to optimize user experience. Expiry: 7 daysType: HTTP AWSALBCORSRegisters which server-cluster is serving the visitor. This is used in context with load balancing, in order to optimize user experience. Expiry: 6 daysType: HTTP g2.com 1 events_distinct_idSets a unique ID for the session. This allows the website to obtain data on visitor behaviour for statistical purposes. Expiry: SessionType: HTTP g2.com images.g2crowd.com api.hubspot.com vimeo.com 4 __cf_bm [x4]This cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website. Expiry: 1 dayType: HTTP play.google.com youtube.com 2 CONSENT [x2]Used to detect if the visitor has accepted the marketing category in the cookie banner. This cookie is necessary for GDPR-compliance of the website. Expiry: 2 yearsType: HTTP seon.io 5 bulkTimePending Expiry: PersistentType: HTML dataPending Expiry: 1 yearType: HTTP SESS#Preserves users states across page requests. Expiry: 1 yearType: HTTP testingThis cookie determines whether the browser accepts cookies. Expiry: 1 dayType: HTTP wistiaUsed by the website to track the visitor's use of video-content - The cookie roots from Wistia, which provides video-software to websites. Expiry: PersistentType: HTML Preferences 7 Preferences cookies enable our website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in. Acast 1 Learn more about this provider AcastLangThis cookie is used to determine the preferred language of the visitor and sets the language accordingly on the website, if possible. Expiry: PersistentType: HTML Hubspot 1 Learn more about this provider messagesUtkStores a unique ID string for each chat-box session. This allows the website-support to see previous issues and reconnect with the previous supporter. Expiry: 179 daysType: HTTP LinkedIn 2 Learn more about this provider lang [x2]Remembers the user's selected language version of a website Expiry: SessionType: HTTP Wistia 1 Learn more about this provider wistia-video-progress-#Contains a timestamp for the website’s video-content. This allows the user to resume watching without having to start over, if the user leaves the video or website. Expiry: PersistentType: HTML demo.arcade.software 1 intercom.intercom-stateStores a unique ID string for each chat-box session. This allows the website-support to see previous issues and reconnect with the previous supporter. Expiry: PersistentType: HTML seon.io 1 currencySaves the visitor's currency preferences. Expiry: 6 daysType: HTTP Statistics 22 Statistics cookies help us to understand how you interact with and use our website by collecting and reporting statistical or analytics information. Hotjar 8 Learn more about this provider _hjAbsoluteSessionInProgressThis cookie is used to count how many times a website has been visited by different visitors - this is done by assigning the visitor an ID, so the visitor does not get registered twice. Expiry: 1 dayType: HTTP _hjFirstSeenThis cookie is used to determine if the visitor has visited the website before, or if it is a new visitor on the website. Expiry: 1 dayType: HTTP _hjIncludedInPageviewSampleUsed to detect whether the user navigation and interactions are included in the website’s data analytics. Expiry: 1 dayType: HTTP _hjIncludedInSessionSampleRegisters data on visitors' website-behaviour. This is used for internal analysis and website optimization. Expiry: 1 dayType: HTTP _hjRecordingLastActivitySets a unique ID for the session. This allows the website to obtain data on visitor behaviour for statistical purposes. Expiry: SessionType: HTML _hjSession_#Collects statistics on the visitor's visits to the website, such as the number of visits, average time spent on the website and what pages have been read. Expiry: 1 dayType: HTTP _hjSessionUser_#Collects statistics on the visitor's visits to the website, such as the number of visits, average time spent on the website and what pages have been read. Expiry: 1 yearType: HTTP hjViewportIdSets a unique ID for the session. This allows the website to obtain data on visitor behaviour for statistical purposes. Expiry: SessionType: HTML Hubspot 4 Learn more about this provider __hsscIdentifies if the cookie data needs to be updated in the visitor's browser. Expiry: 1 dayType: HTTP __hssrcUsed to recognise the visitor's browser upon reentry on the website. Expiry: SessionType: HTTP __hstcSets a unique ID for the session. This allows the website to obtain data on visitor behaviour for statistical purposes. Expiry: 179 daysType: HTTP hubspotutkSets a unique ID for the session. This allows the website to obtain data on visitor behaviour for statistical purposes. Expiry: 179 daysType: HTTP LinkedIn 1 Learn more about this provider AnalyticsSyncHistoryUsed in connection with data-synchronization with third-party analysis service. Expiry: 29 daysType: HTTP Microsoft 5 Learn more about this provider c.gifCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner. Expiry: SessionType: Pixel CLIDCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner. Expiry: 1 yearType: HTTP _clckCollects data on the user’s navigation and behavior on the website. This is used to compile statistical reports and heatmaps for the website owner. Expiry: 1 yearType: HTTP _clskRegisters statistical data on users' behaviour on the website. Used for internal analytics by the website operator. Expiry: 1 dayType: HTTP _cltkRegisters statistical data on users' behaviour on the website. Used for internal analytics by the website operator. Expiry: SessionType: HTML New Relic 2 Learn more about this provider events/1/#Used to monitor website performance for statistical purposes. Expiry: SessionType: Pixel jserrors/1/#Pending Expiry: SessionType: Pixel Twitter Inc. 1 Learn more about this provider personalization_idThis cookie is set by Twitter - The cookie allows the visitor to share content from the website onto their Twitter profile. Expiry: 2 yearsType: HTTP demo.arcade.software 1 ajs_anonymous_idThis cookie is used to count how many times a website has been visited by different visitors - this is done by assigning the visitor an ID, so the visitor does not get registered twice. Expiry: PersistentType: HTML Personalization and Marketing 42 Personalization and Marketing cookies are used to track you on our website or across websites and devices, and to display you content and ads that are relevant and engaging for you on our websites or third-party websites, including on social media. Meta Platforms, Inc. 1 Learn more about this provider _fbpUsed by Facebook to deliver a series of advertisement products such as real time bidding from third party advertisers. Expiry: 3 monthsType: HTTP Google 7 Learn more about this provider IDEUsed by Google DoubleClick to register and report the website user's actions after viewing or clicking one of the advertiser's ads with the purpose of measuring the efficacy of an ad and to present targeted ads to the user. Expiry: 1 yearType: HTTP pagead/landing [x2]Collects data on visitor behaviour from multiple websites, in order to present more relevant advertisement - This also allows the website to limit the number of times that they are shown the same advertisement. Expiry: SessionType: Pixel ads/ga-audiencesUsed by Google AdWords to re-engage visitors that are likely to convert to customers based on the visitor's online behaviour across websites. Expiry: SessionType: Pixel NIDRegisters a unique ID that identifies a returning user's device. The ID is used for targeted ads. Expiry: 6 monthsType: HTTP pagead/1p-user-list/#Tracks if the user has shown interest in specific products or events across multiple websites and detects how the user navigates between sites. This is used for measurement of advertisement efforts and facilitates payment of referral-fees between websites. Expiry: SessionType: Pixel _gcl_auUsed by Google AdSense for experimenting with advertisement efficiency across websites using their services. Expiry: 3 monthsType: HTTP Hotjar 1 Learn more about this provider _hjRecordingEnabledThis cookie is used to identify the visitor and optimize ad-relevance by collecting visitor data from multiple websites – this exchange of visitor data is normally provided by a third-party data-center or ad-exchange. Expiry: SessionType: HTML Hubspot 1 Learn more about this provider __ptq.gifSends data to the marketing platform Hubspot about the visitor's device and behaviour. Tracks the visitor across devices and marketing channels. Expiry: SessionType: Pixel LinkedIn 5 Learn more about this provider bcookieUsed by the social networking service, LinkedIn, for tracking the use of embedded services. Expiry: 2 yearsType: HTTP bscookieUsed by the social networking service, LinkedIn, for tracking the use of embedded services. Expiry: 2 yearsType: HTTP li_sugrCollects data on user behaviour and interaction in order to optimize the website and make advertisement on the website more relevant. Expiry: 3 monthsType: HTTP lidcUsed by the social networking service, LinkedIn, for tracking the use of embedded services. Expiry: 1 dayType: HTTP UserMatchHistoryUsed to track visitors on multiple websites, in order to present relevant advertisement based on the visitor's preferences. Expiry: 29 daysType: HTTP Meta Platforms, Inc. 1 Learn more about this provider trUsed by Facebook to deliver a series of advertisement products such as real time bidding from third party advertisers. Expiry: SessionType: Pixel Microsoft 9 Learn more about this provider MUID [x2]Used widely by Microsoft as a unique user ID. The cookie enables user tracking by synchronising the ID across many Microsoft domains. Expiry: 1 yearType: HTTP SRM_BTracks the user’s interaction with the website’s search-bar-function. This data can be used to present the user with relevant products or services. Expiry: 1 yearType: HTTP ANONCHKRegisters data on visitors from multiple visits and on multiple websites. This information is used to measure the efficiency of advertisement on websites. Expiry: 1 dayType: HTTP SMRegisters a unique ID that identifies the user's device during return visits across websites that use the same ad network. The ID is used to allow targeted ads. Expiry: SessionType: HTTP _uetsidCollects data on visitor behaviour from multiple websites, in order to present more relevant advertisement - This also allows the website to limit the number of times that they are shown the same advertisement. Expiry: 1 dayType: HTML _uetsid_expContains the expiry-date for the cookie with corresponding name. Expiry: PersistentType: HTML _uetvidUsed to track visitors on multiple websites, in order to present relevant advertisement based on the visitor's preferences. Expiry: 1 yearType: HTML _uetvid_expContains the expiry-date for the cookie with corresponding name. Expiry: PersistentType: HTML Twitter Inc. 4 Learn more about this provider i/adsct [x2]The cookie is used by Twitter.com in order to determine the number of visitors accessing the website through Twitter advertisement content. Expiry: SessionType: Pixel muc_adsCollects data on user behaviour and interaction in order to optimize the website and make advertisement on the website more relevant. Expiry: 2 yearsType: HTTP i/jotSets a unique ID for the visitor, that allows third party advertisers to target the visitor with relevant advertisement. This pairing service is provided by third party advertisement hubs, which facilitates real-time bidding for advertisers. Expiry: SessionType: Pixel YouTube 10 Learn more about this provider VISITOR_INFO1_LIVETries to estimate the users' bandwidth on pages with integrated YouTube videos. Expiry: 179 daysType: HTTP YSCRegisters a unique ID to keep statistics of what videos from YouTube the user has seen. Expiry: SessionType: HTTP ytidb::LAST_RESULT_ENTRY_KEYStores the user's video player preferences using embedded YouTube video Expiry: PersistentType: HTML yt-remote-cast-availableStores the user's video player preferences using embedded YouTube video Expiry: SessionType: HTML yt-remote-cast-installedStores the user's video player preferences using embedded YouTube video Expiry: SessionType: HTML yt-remote-connected-devicesStores the user's video player preferences using embedded YouTube video Expiry: PersistentType: HTML yt-remote-device-idStores the user's video player preferences using embedded YouTube video Expiry: PersistentType: HTML yt-remote-fast-check-periodStores the user's video player preferences using embedded YouTube video Expiry: SessionType: HTML yt-remote-session-appStores the user's video player preferences using embedded YouTube video Expiry: SessionType: HTML yt-remote-session-nameStores the user's video player preferences using embedded YouTube video Expiry: SessionType: HTML demo.arcade.software 1 ajs_user_idCollects data on visitors' preferences and behaviour on the website - This information is used make content and advertisement more relevant to the specific visitor. Expiry: PersistentType: HTML seon.io 2 __mpq_#_#Collects data on user behaviour and interaction in order to optimize the website and make advertisement on the website more relevant. Expiry: PersistentType: HTML mp_#_mixpanelPending Expiry: 1 yearType: HTTP Functional 4 Functional cookies are used to ensure the proper functioning of our website. g2.com 1 _g2_session_idPending Expiry: SessionType: HTTP seon.io 3 bulkPagePending Expiry: PersistentType: HTML bulkSecretPending Expiry: PersistentType: HTML preact-i18nPending Expiry: PersistentType: HTML Cross-domain consent[#BULK_CONSENT_DOMAINS_COUNT#] [#BULK_CONSENT_TITLE#] List of domains your consent applies to: [#BULK_CONSENT_DOMAINS#] Cookie declaration last updated on 20.06.22 by Cookiebot [#IABV2_TITLE#] [#IABV2_BODY_INTRO#] [#IABV2_BODY_LEGITIMATE_INTEREST_INTRO#] [#IABV2_BODY_PREFERENCE_INTRO#] [#IABV2_LABEL_PURPOSES#] [#IABV2_BODY_PURPOSES_INTRO#] [#IABV2_BODY_PURPOSES#] [#IABV2_LABEL_FEATURES#] [#IABV2_BODY_FEATURES_INTRO#] [#IABV2_BODY_FEATURES#] [#IABV2_LABEL_PARTNERS#] [#IABV2_BODY_PARTNERS_INTRO#] [#IABV2_BODY_PARTNERS#] Scope. This cookie notice (“Cookie Notice”) provides you with information on how SEON Technologies Kft. (“SEON” or “we”) and our social media advertising, analytics, etc. partners use cookies on seon.io and docs.seon.io. Cookies. Cookies are small text files that are sent to your device by the browser upon request of the websites. When this notice mentions cookies it should be understood to include similar technologies (e.g. pixel tags, web beacons, local storage, etc.). The cookies that we provide or set on your device while you are visiting our websites are called first party cookies. The cookies that our partners provide or set on your device are third party cookies. Each cookie lasts for a different period of time. Session cookies will last only while your browser is open. When you close the browser, this cookie will be deleted automatically. Persistent cookies will survive even after closing the browser. For example, we will recognize your device via these cookies when you open the browser again. Further information about cookies. Learn more about the purposes of cookies, the duration of the operation of cookies, our social media, advertising, analytics, etc. partners that use cookies on our websites under “Details”. Data collected about you. We and our partners process the cookie ID and related data such as information about your device, the functioning of our website, your preferences etc. Please note that normally we are not able to identify you based on these data, therefore they are normally not considered personal data. If, on the basis of specific circumstances, we are able to identify you based on these data, we inform you that we process your personal data in accordance with our Privacy Notice. Recipients. SEON shares the cookie ID and related data with the following recipients: cloud providers, customer relationship management (CRM) providers, integration tool providers, instant messaging providers, video conferencing tool providers, UI/UX tool providers, social media providers, online advertising platforms and agencies, marketing and analytics tools providers. For further information about our data sharing practices please see our Privacy Notice. Your choices. We use “Functionality and Preferences”, “Personalization and Marketing” and “Statistics” cookies on the basis of you consent. You can at any time, provide, change or withdraw your consent from these cookies under “Details”. Please note that our use of “Necessary” cookies is not subject to your consent, we use them by default, as without these cookies, our website functions requested by you do not work. Device fingerprinting. We use device fingerprinting technology for ensuring information security of our services and for preventing frauds. For further information please see our Privacy Notice. Further information about our privacy practices. Our Privacy Notice complements this Cookie Notice. Learn more about who we are, how you can contact us or our data protection officer, how we process personal data, what are your rights regarding your personal data, and what are our data protection and privacy practices in our Privacy Notice. [#OOI_PERSONAL_INFORMATION#] Reject Allow selection Customize Allow all Powered by Cookiebot by Usercentrics * Products -------------------------------------------------------------------------------- Products * SEON The anti-fraud solution loved by fraud managers. * Integrations APIs, SDKs, Zapier and integration partners. * Shopify App One-click integration for Shopify. * Use Cases -------------------------------------------------------------------------------- Use Cases * Banking & Insurance * iGaming & Gambling * Online Lending * Ecommerce * Travel & Ticketing * Buy Now Pay Later (BNPL) * Payment Gateways * Crypto & Trading * Resources -------------------------------------------------------------------------------- Resources * Articles * Podcasts * Webinars * Case Studies * Guides * Videos * Dictionary * Comparisons * Developers -------------------------------------------------------------------------------- Developers * Getting Started * Common Fraud Problems * Product Overview * Device Fingerprinting * Machine Learning * End-to-end Fraud Prevention * Integration * Quick Start * Integration Overview * Integration Timeline * Knowledge Base * User Manual * Whitepapers * Transaction Details * API Reference * Fraud API * Email API * Phone API * IP API * Device Fingerprinting * Company -------------------------------------------------------------------------------- Company * About Us * Mediaroom * Careers * Who We Work With * Contact Us * News * Pricing Try for freeGet a demo -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- MENU Login -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- * Products * SEON The anti-fraud solution loved by fraud managers. * Integrations APIs, SDKs, Zapier and integration partners. * Shopify appOne-click integration for Shopify. * Use Cases * Banking & Insurance * iGaming & Gambling Fraud * Online Lending * Ecommerce * Travel & Ticketing * Buy Now Pay Later (BNPL) * Payment Gateways * Crypto & Trading * Resources * Articles * Podcasts * Webinars * Case Studies * Guides * Videos * Dictionary * Comparisons * Developers * Getting Started * Common Fraud Problems * Product Overview * Device Fingerprinting * Machine Learning * End-to-end Fraud Prevention * Integration * Quick Start * Integration Overview * Integration Timeline * Knowledge Base * User Manual * Whitepapers * Transaction Details * API Reference * Fraud API * Email API * Phone API * IP API * Device Fingerprinting * Company * About Us * Mediaroom * Careers * Who We Work With * Contact Us * News * Pricing Try for freeGet a demo -------------------------------------------------------------------------------- Login Follow Us! ThumbsUp info@seon.io+44 20 8089 2900 © Copyright SEON Technologies Ltd. - Privacy Policy ; * Home * Resources * Articles 11 TYPES OF TELECOMMUNICATIONS FRAUD: HOW TO DETECT & PREVENT IT by Tamas Kadar Table of Contents * What Is Telecommunications Fraud? * How Does It Work? * 11 Types of Telecom Fraud * What Is Telecom Fraud Detection and Prevention? * Telecommunications Fraud Solutions * FAQ * What Is Telecommunications Fraud? * How Does It Work? * 11 Types of Telecom Fraud * What Is Telecom Fraud Detection and Prevention? * Telecommunications Fraud Solutions * FAQ Historically, telecommunications companies have been slow to deploy RiskOps departments. Losses were either absorbed or passed on to the repo business. But telecom operators are increasingly inclined to meet their unique fraud challenges head-on. Let’s examine them in detail here and see what kind of tools can help. WHAT IS TELECOMMUNICATIONS FRAUD? Telecommunications fraud, also known as telco fraud or telecom fraud, includes any kind of activity designed to abuse and gain an advantage over telecommunications companies using deception (fraudulent practices). This includes IRSF fraud (International Revenue Sharing Fraud), where fraudsters abuse premium phone rates, and interconnect bypass fraud, a form of arbitrage between operators’ call rates. HOW DOES TELECOMMUNICATIONS FRAUD WORK? Because telephony is the largest and oldest deployed network in the world, accounting for 48% of the worldwide consumer electronics revenue, fraudsters have long developed tools and practices to exploit it to extract value. And while fraud attacks usually evolve quickly over time as companies squash them, telco fraud is unique as it’s often taken as a given. Its costs are absorbed by operators, who would rather not embark on integrating complex risk management systems into their architectures. Adding to the challenge is the fact that telecom companies also break down their services to resell them to local networks and carriers – a £4/$5 billion industry in the UK alone. As the technology to run your own mobile network becomes more widely available, large telecom operators are becoming targets of fraud indirectly, making it harder to identify. Worried about Telecom Fraud? Protect your business with SEON’s advanced real time fraud fighting tools to keep you and your customers secure Book a Demo 11 TYPES OF TELECOMMUNICATIONS FRAUD Let’s now look at the most common types of telco fraud attacks operators should know about. 1. INTERNATIONAL REVENUE SHARING FRAUD (IRSF) International Revenue Sharing Fraud, or IRSF fraud, takes advantage of premium phone rates, which are then dialed unwittingly by users. It is by far the biggest fraud challenge for telecom operators, costing the industry an estimated $4 to $6.1 billion a year. This is how it works: 1. Bad agents sign up to lease a premium phone number. 2. They break into a business’s phone systems and make calls to that number. 3. The business pays as much as $1 a minute, 25% of which goes into the fraudster’s pockets. Businesses may suddenly find themselves with astronomical phone bills for calls they do not recognize. The calls often happen outside of working hours and companies only realize they’ve been made when it’s time to foot the bill. It doesn’t help that regulation is lacking in this area. Unlike with card payments, where the chargeback process can protect the person whose credit card was stolen, there is no such thing in the telephony world. 2. INTERCONNECT BYPASS FRAUD Interconnect bypass fraud, also known as SIM box fraud, takes advantage of something called a termination rate to make cheaper phone calls. It is estimated to cost telecom operators $2.7 billion in lost revenue per year. To understand it, let’s look at a scenario with two operators in different countries: 1. A customer of Operator A calls a customer of Operator B. 2. Operator A charges its customer a fee per minute. 3. Operator B charges Operator A a fee for providing the call to its customer. That last charge, where the call terminates, is the termination rate. These rates vary wildly depending on the contracts between the two operators. Some of them are expensive, others are close to 0. This is where a fraudulent operator comes into the picture. They reroute these international calls using a SIM box or GSM gateway, effectively hijacking the connection to achieve cheaper termination rates. They are essentially making long-distance calls much cheaper, but the caller pays the same price – so the fraudster telco pocketss the difference. This also impacts telecom customer satisfaction because more often than not, the quality of these calls will be inferior to standard international calls. 3. TELECOM ARBITRAGE FRAUD Arbitrage is the general practice of capitalizing on price differences. In the telco world, these differences appear in the long-distance rates between countries. Just like with international bypass fraud, it can lower the international cost for customers, but also open the door to fraudulent companies who insert themselves between operators. They claim to connect directly from country A to B, whereas, in fact, they go through a cheaper rate country to connect the call. 4. PBX HACKING PBX hacking allows fraudsters to take control of phone lines by exploiting unsecured phone networks. A PBX (private branch exchange) is a private phone network that connects to external networks. It’s what allows companies to share lines and to reduce the number of numbers needed in an office, for instance. Because a lot of these PBX are IP-based, they can be an easy target for hackers. They will log into the system and use it to their advantage – for instance for instances of IRSF fraud mentioned above. This is a cybersecurity and IT issue that can be avoided with better internal controls and password security. 5. TRAFFIC PUMPING Traffic pumping, also known as access stimulation, is a practice where unscrupulous local exchanges cook the numbers of calls to their networks to benefit from compensation fees set up by the US FCC. Under the Telecommunications Act of 1996, big telcos such as Sprint, Verizon, and AT&T have to pay fees to rural carriers – so these carriers do everything in their power to boost the number of calls to get larger payouts. 6. DEPOSIT FRAUD Essentially a type of credit card fraud, deposit fraud targets telecom operators’ online stores using stolen credit card numbers. Fraudsters usually purchase prepaid SIMs, but the same technique applies to devices (smartphones, routers, etc.). The problem, of course, is that online telecom stores are responsible for refunding the fees in the form of chargebacks. You could, of course, rely on your payment processor to reduce these rates or deploy chargeback-guarantee fraud prevention tools, but this does make your company vulnerable to high rates of false positives – where legitimate customers are prevented from making a purchase. There’s also a growing threat in the form of 4G proxy networks, a practice that’s been booming in recent years, both for legitimate business and residential use cases. Unfortunately, fraudsters also purchase SIM cards and USB dongles en masse to create their own residential mobile network. While services like Proxidize claim to cut costs and offer higher speeds, they also allow fraudsters to launch more attacks by generating and controlling IP addresses. 7. SUBSCRIPTION FRAUD Subscription fraud in the telephony world sees criminals sign up for contracts using stolen IDs and stolen credit card numbers. Phone contracts are harder for fraudsters to purchase than items because they involve a form of KYC check. That is to say, you need to verify the user’s identity before they can subscribe. Fraudsters love high-end smartphones they can acquire through contracts. It’s a simple case of submitting fake IDs, jailbreaking the device, and reselling it on second-hand markets. By the time the repo company comes, it realizes the person does not exist. So how do they pass the KYC checks? That’s barely an inconvenience for identity fraud experts. They have a large pool of stolen identities to choose from, acquired via phishing techniques, bought on the dark web, or rented out from ID mules. It should be noted that in-store purchases tend to have a higher risk rate than shipping. While fraudsters have plenty of options for acquiring drop addresses (where they receive items not tied to their real identities), it’s much easier for them to walk in and pick up the devices in person. 8. ACCOUNT TAKEOVER Telecom companies who offer online user accounts can be victims of ATO attacks, where fraudsters find the login and password details of other users and sign in in their place. If your online store lets users create accounts, chances are fraudsters are ready to steal them – regardless of what you sell. It is expensive, as Javelin estimates it costs a business an average of $263 to recover a user’s account, not to mention how it can damage your business reputation. The point is that you need to have systems in place to authenticate user logins to ensure you are indeed allowing the right people into your store. 9. SMISHING/SMS PHISHING Smishing, also known as SMS phishing, is the practice of sending mass SMS in order to obtain personal information from the person who receives the messages. Mass spam campaigns are the bane of customers’ and telcos’ existence. This is why SMS phishing rings have become adept at avoiding detection. They’ve been known to use software to confirm the numbers they target are mobiles and not landlines (so telcos don’t notice red flags), create auto-shops to resell the stolen details, and even provide their own hosting services to host phishing sites and marketplaces. The volume of social engineering attacks that take the form of smishing skyrocketed by more than 328% in 2020 and while telco operators don’t always take the fall for it, they should feel uncomfortable knowing that they are accidentally complicit in the practice (and it potentially affects their reputation, too) A simple system for monitoring signups and transactions coming from the B2B service should be enough to ensure your telco company isn’t helping a smishing business. 10. WANGIRI FRAUD From the Japanese meaning “one and cut”, wangiri telecommunications fraud involves striking curiosity in customers by calling them, letting the phone ring once, and hanging up. The customer will often ring back, unwillingly calling an expensive premium number that the fraudsters control. An SMS variant of this also exists, where fraudsters send a message prompting customers to call back a certain number, or even text it. The typical red flags for this kind of telecommunications fraud are spikes in traffic to high-cost destinations, which telcos should be able to monitor with their internal systems. The key here is to know that, as a business, you should keep an eye on which numbers are automatically dialed. This isn’t only for telcos, by the way: Any company where phone calls are an important part of finding leads or customer service could do well to deploy a simple reverse phone lookup tool to protect themselves whenever someone is asked to dial back an unknown number. 11. SIM JACKING AND SIM SWAPPING Also known as SIM swapping, SIM jacking sees fraudsters take control of a person’s SMS messages and phone calls by switching a phone number to another they are in control of. As more and more companies, such as banks, use OTP (one-time passwords) and 2FA (2-factor verification) delivered in the format of text messages or phone calls, fraudsters are attempting to take control of people’s phone numbers in order to intercept them. The way they do it is via a form of account takeover called SIM jacking or SIM swapping (which you can read more about in our fraud trends 2021 post) The fraudster will contact the telco’s customer service and ask to transfer their number to a new SIM, which they control. When the procedure is complete, they can receive all the OTPs and SMS verifications needed to hijack customer accounts, from social media to fintech apps. Telco operators have become much better at mitigating this kind of risk in the last few years, simply by deploying their own multi-factor authentication (MFA) systems to confirm if the user legitimately requested a number change. WHAT IS TELECOMMUNICATIONS FRAUD DETECTION AND PREVENTION? Telecommunications fraud detection and prevention is a broad term that covers any kind of technique or strategy put in place to reduce criminal actions designed to take advantage of telco operators. Telecommunications fraud detection and prevention should target three key areas: * vetting and filtering out bad resellers * protecting business revenue * ensuring users and customers are really who they say they are It is with the third area that SEON can help, thanks in part to technology such as data enrichment, device fingerprinting, and machine-learning suggestions. WHAT TO LOOK OUT FOR IN TELECOMMUNICATIONS FRAUD IN 2022 AND BEYOND Telecommunications fraud is always evolving. However, we have recently witnessed a rise in key attack vectors, including: * Fake and synthetic IDs: Fraudsters have access to an increasingly wide range of options to source ID documents, either via phishing or rent-an-ID service. Detection has become a lot more challenging because parts of synthetic IDs are legitimate. * Virtual SIM cards: While eSIMs – virtual SIM cards – are more secure by virtue of being less easy to clone or steal, virtual SIMs are nonetheless prone to malware and social engineering attacks. * Social engineering attacks: The pandemic has greatly amplified the frequency and sophistication of phishing attacks, be they via SMS, calls, social engineering, or even using deepfake technology. This includes more personalized instances such as CEO fraud and spear-phishing attempts. SOLUTIONS FOR TELECOMMUNICATIONS FRAUD Fraudsters are adept at evading identification. They will use stolen IDs and card numbers and deploy every possible tactic possible to hide their real-life identities and intentions. This is true whether your telecommunications business is dealing with an online store customer or a local carrier. With SEON, you can learn as much as possible about who you’re dealing with, with as little friction as possible. In the context of telecommunications fraud prevention that means deploying frictionless, invisible, and efficient tools to aggregate info without disturbing the customer experience of your telco business customers. The results? Smoother business operations, and reduced rates of account takeover, transaction fraud, and ID fraud – all thanks to a powerful machine-learning driven engine and full risk management control. Reduce fraud by up to 96% Partner with SEON to reduce fraud rates in your business with real time data enrichment and advanced APIs Book a Demo TELECOMMUNICATIONS FRAUD FAQ What are the major categories of telecommunication fraud? The most costly fraud attacks for telecommunication companies include IRSF (international revenue share fraud), bypass fraud, and traffic pumping. How is telecommunications fraud detected? Fraudulent attacks such as account takeover, transaction fraud, and subscription fraud targeting telecommunications operators can be detected with real-time monitoring, digital footprinting and data enrichment. This allows companies to learn more about users in order to accept or decline their actions, such as a payment or login. You might also be interested in reading about: * SEON: 5 Fraud Trends We’ll Be Keeping an Eye On in 2021 * SEON: Virtual SIM Cards: What They Are & How Fraudsters Use Them * SEON: Fraud Detection & Prevention: What It Is & How to Choose a Solution * SEON: IP Fraud Score: How IP Analysis Works for Fraud Detection Learn more about: Data Enrichment | Browser Fingerprinting | Device Fingerprinting | Fraud Detection API | Fraud Detection with Machine Learning & AI Sources used for this article: * Telephony Report 2020: Telephony Report 2020 * IBISWorld: Telecommunications Resellers in the UK – Market Research Report * ZDNet: Phone fraudsters are stealing billions each year through a scheme known as IRSF * Javelin: Identity Fraud Hits Record High with 15.4 Million U.S. Victims in 2016 * Proofpoint: Mobile Phishing Increases More Than 300% as 2020 Chaos Continues * Infosys BPM Podcast: Emerging Telecom Fraud Trends SHARE ARTICLE ARTICLES Showing all post with `` tag Blog ONLINE PAYMENT METHOD FRAUD: FIGURES & STATS by Gergo Varga Exactly how prevalent is payment method fraud and who is most affected? Blog BANKING KYC: HOW IT WORKS AND HOW TO SAVE COSTS by Jimmy Fong See how you can streamline your KYC process for banking. Blog HOW TO IMPROVE AML IN IGAMING by Jimmy Fong iGaming companies provide perfect conditions for money laundering – how can you stop it? Blog APPLICATION FRAUD: 5 TIPS TO DETECT AND PREVENT IT by Tamas Kadar Learn about application fraud and how to detect it with minimum friction. Blog UNDERSTANDING PAYMENT FRAUD IN IGAMING by Gergo Varga How can we solve the problem of payment fraud in iGaming? SEE A LIVE DEMO OF OUR PRODUCT Click here TAMAS KADAR CEO Tamas is the founder and CEO of SEON and an expert in all the technological aspects of fraud prevention. TAGS Risk Ops Telco Fraud Understanding Fraud Prevention -------------------------------------------------------------------------------- SEON RESOURCES ARTICLES 193 PODCASTS 35 WEBINARS 26 CASE STUDIES 21 VIDEOS 40 DICTIONARY 46 GUIDES 23 COMPARISONS 47 GET OUR LATEST NEWSLETTER Join over 6000 companies in getting the latest fraud-fighting tips Fraud Fighters e: info@seon.io p: +44 20 8089 2900 Contact Us 4.7 4.9 -------------------------------------------------------------------------------- Navigation * Home * Products * Use Cases * Pricing * Integration * API Status * Resources * Request Demo * FAQ Menu * Developers * Events * Careers * Contact Us * About * Login Social * * * * * © Copyright SEON Technologies Ltd. - Privacy Policy Made with in Budapest, London, Austin & Jakarta