SlideShare une entreprise Scribd logo
1  sur  32
International Revenue Share
Fraud Webinar
Colin Yates
Yates Fraud Consulting Ltd.
Roaming and IRSF Webinar – 3 December 2013
Webinar Agenda
• Introduction to IRSF
• Recent case studies
• Law Enforcement action re IRSF
• Introduction to IRSF – 5 Stages
• IPR Number Resellers
• Number Misappropriation (Hijacking)
• Industry initiatives to reduce IRSF losses
• Industry’s contributing factors to IRSF
• Risk mitigation & recommendations
• Q & A
Introduction to IRSF
• There are a number of definitions available to describe IRSF A
simple description would be:
‘Using fraudulent access to an Operators
network to artificially inflate traffic to
numbers obtained from an International
Premium Rate Number Provider, for which
payment will be received by the Fraudster (on
a revenue share basis with the number
provider) for every minute of traffic generated
into those numbers.’
IRSF
What is our view of the fraudster?
Recent Case Studies
USA & Barcelona
Case Study No. 1
USA
• Small USA network operator providing service to SME’s
– 2 PBX’s hacked with IRSF losses of $US160,000 suffered over a 30 hour
period
– Their carrier discovered fraud and served immediate notice that they
required full payment within 48 hours
• Carrier unable to pay and only option was to close down
• Asked for my assistance and was able to provide sufficient
information to get debt reduced with time to pay
• Confirmation that IRSF will impact any operator, irrespective
of size, location or services offered, and losses could have
been significantly reduced by effective Risk Mgt
Case Study No. 2
Handset Theft - Barcelona
• Major issue impacting many operators who have customers
roaming in Spain
– Barcelona well known as the ‘Pickpocket’ capital
– Since Jan 2013, an average of 260 mobiles per month have been stolen
and the Simcards used for IRSF
– All 4 Spanish networks being used, losses per Simcard are averaging
€10,000 per hour
• Fraudsters using combination of International Call Forward,
multi party calling, and associated PBX Fraud
• Also discovered that some roamers are selling their mobiles
for €500 and then reporting them stolen later!
Law Enforcement action for IRSF
• We cannot rely of Law Enforcement to
investigate IRSF, prosecute fraudsters
and seek reparation for operators
• Investigating IRSF is complex, typically
extending across 3 or 4 international
borders
• Simply determining jurisdiction will be
a challenge
• A recent USA IRSF investigation took
almost 3 years to complete by an
operator and federal agency task force
• Principals were arrested in Malaysia for
IRSF involving tens of millions of dollars
• Before extradition could be
arranged, fraudsters were bailed and fled
to Pakistan.
The 5 Basic steps to IRSF
1
Access a
Network
2
Obtain
IRSF
numbers
3
Generate
the calls
4
Receive
payment
5
Determine
loss
1. Access to a Network
• Fraudster must obtain the means to make these calls
• To maximise income, preferably at no cost to Fraudster
• Common ‘Primary Frauds’ to gain access are;
– Subscription Fraud
– SIM Cloning
– Theft of handsets or SIM cards
– PBX Hacking
– Wangiri Fraud
– Arbitrage (Requires the exploitation of a bundled or discounted tariff
offering calls at less cost than any IRS pay-out offered)
2. Obtain IRSF Numbers
• Fraudster may have existing relationship with IPRN Provider
• If not, will search Internet to find one
• Obtains a ‘Test Number’ from Reseller website
• Will chose a destination with good pay-out (Latvia €0.17c)
• Calls Test Number to confirm a call will connect
• Once confirmed, will request numbers from IPRN Provider
• Request will include an estimate of minutes to be
generated
• Will include his bank account details so that funds based on
minutes generated can be credited every 7 to 30 days
3. Generate traffic
• Once IRS numbers issued, Fraudster starts generating calls
• To maximise revenues, Fraudster will utilise network
services to generate overlapping, simultaneous calls
• Such services will include International Call Forwarding,
Multi-Party calling, combining PBX with C/Fwd mobile Sim
• Fraudster will continue this activity until originating
number range owner becomes aware of fraud and blocks
access
• Typically the Fraudster will then move to another
fraudulent access and continue calling additional numbers
providing by the IPR Number Provider
4. Receive payment
• In most circumstances the originating number range holder is
required to make payment for this fraudulent traffic
– Existing Roaming or Interconnect agreement requirement
• Initial payment made to roaming or interconnect partner
• Payment continues down value chain to reach the terminating
number range owner
• Terminating operator retains his share and pays IPRN Provider
• IPRN Provider shares this balance by paying the Fraudster
(e.g. €0.17c per minute for calls to Latvia) and retaining the
balance.
5. Determining loss
• Originating Number range holder has made full payment
• In case of Subscription or other SIM based fraud, little or no
chance of recovering this from the fraudster.
• In case of PBX Fraud, typically the network provider will
attempt to recover cost of fraud from the PBX user
• In many cases this will result in a dispute, unwanted
publicity and customer churn unless network provider
accepts all or part of this loss
• PBX user will typically argue that their network provider
should have discovered such a huge increase in calling
activity
• All other transit operators, IRS Number owner, number
reseller and fraudster have benefited from this fraud
IPR Number Resellers
• Number of Resellers continues to increase:
– 17 in 2009
– 47 in 2012
– 85 in October 2013
• 400% increase in 4 years
• Most of this increase results in those wanting
to exploit IRSF revenues
• Many now acting as Number Wholesalers
Number Misappropriation (Hijacking)
• Usually involves
Country numbers with
high termination rates
– e.g Small Island
nation at $US0.65c
• Fraudsters will act in
collusion with a
dishonest carrier
• Advertise ‘below cost’
rates into country to
attract operators
looking for Least Cost
Routing (LCR)
• Calls will be routed in a
certain direction to
ensure that they hit
the ‘dishonest
operators’ network
• Once there, they will
be filtered out and
‘short-stopped’ outside
the
• Payment follows the
same value chain as
the call routing
Industry initiatives to reduce IRSF
losses
• Very little industry progress
to stop IRSF/Hijacking
• ITU misuse reporting is not
being supported
• I3 Forum has published
guidelines, but again, these
are not being supported by
all of their membership
• BEREC have issued
guidelines re with-holding
payment however these
apply only to European
operators and are complex
• Continued lack of
cooperation within the
operator community
• Regretfully, the Fraudsters
appear to be better
organised to take full
advantage of industry
weaknesses
Industry’s ability to implement initiatives
for steps 1 – 5 of IRSF
1
Access a
Network
2
Obtain
IRSF
numbers
3
Generate
the calls
4
Receive
payment
5
Determine
loss
1 – Access to a network
 Subscription Fraud and it’s variations can be reduced with
effective Fraud Management Systems
 SIM cloning can be eliminated by upgrading algorithm
 PBX Fraud can be reduced by implementing fraud awareness
programs and audits for business customers
 Arbitrage can be avoided by ensuring that risk reviews are
completed on all new products, services and tariffs
 Invest in a fraud management solution
However controls must be relative to preventing
fraud while minimising customer impact.
2 – Obtaining IPR Numbers
 IPR Number Resellers have increased by 400% since 2009
 85+ are now competing to attract fraudsters to them
 Up to 75% of fraudsters embarking on an IRS Fraud will call a
Test Number, provided by the Reseller first.
 Most of these Test Numbers are now available in a database
as an IRSF detection tool
Implement a cost effective Fraud Management System
which uses a Test Number Database as a hotlist. This
alerts a CSP to a potential IRSF incident and has already
shown benefits.
3 – Generate traffic
 Reduce the opportunity for fraudsters to maximise revenues
by;
– Removing International Call Forwarding and Multi Party calling from
roaming customer SIM’s
– Ensure that automated systems are in place to analyse NRTRDE
records 24x7 and refer alerts to analysts
– Ensure automated systems are in place to notify analysts 24x7 of calls
to known IRSF destinations
Up to 87% of all reported IRSF occurs between 8.00pm
Friday and 8.00am Monday. If the fraud function does
not operate during this period, alternatives must be
identified.
4 – Receive Payment
 Early identification of IRSF does provide opportunities to
negotiate payment withholding by partners
 Position is strengthened if impacted operator is able to
confirm that IRSF losses relate to a hijacked number range
The earlier an incident is identified, the less the fraud
loss will be, so early detection is critical.
5 – Determining Loss
 In most situations, it will be the originating number owner
who will suffer the loss for IRSF, and it is their responsibility to
ensure that they have systems and processes in place to
minimise these losses.
 Accurate reporting with evidential information is essential to
identifying true losses, enabling future accurate
detection/prevention through knowledge transfer.
Fraud management solutions have good reporting capabilities
and will support the creation of future intelligence in the fight
against IRSF.
IRS Test Number Database (PRISM)
IRS Test Number Database (PRISM)
• YFCL are monitoring the IPR Number Reseller websites and
developed an IRS Test Number Database (PRISM)
• This database currently contains over 25,500 test numbers
– PRISM has been made available on a subscription basis to operators
since the 21 August 2013
– It is used as a ‘hot-list’ within an FMS to alert operators when a Test
Number has been called
– It has proved to be very effective at identifying IRSF
• Xintec are the only FMS Provider licenced to offer PRISM free
as a hot list within their FMSevolution product.
Example of IRSF Test Numbers
Date Time A Number B Number Call Duration
30/03/2013 05:17:33 XXX977860XX 23221104397 7
30/03/2013 05:32:14 XXX977860XX 23221104397 5
30/03/2013 05:57:22 XXX977860XX 23221104397 5
30/03/2013 06:03:41 XXX977860XX 23221300284 19
30/03/2013 06:13:55 XXX977860XX 23221300284 601
30/03/2013 06:13:57 XXX977860XX 23221300284 581
30/03/2013 06:13:58 XXX977860XX 23221300284 538
30/03/2013 06:13:58 XXX977860XX 23221300284 551
30/03/2013 06:14:01 XXX977860XX 23221300284 576
30/03/2013 06:14:01 XXX977860XX 23221300284 592
30/03/2013 06:14:02 XXX977860XX 23221300284 543
30/03/2013 06:14:03 XXX977860XX 23221300284 575
30/03/2013 06:14:05 XXX977860XX 23221300284 530
30/03/2013 06:14:06 XXX977860XX 23221300284 593
30/03/2013 06:14:07 XXX977860XX 23221300284 498
30/03/2013 06:14:07 XXX977860XX 23221300284 588
30/03/2013 06:14:08 XXX977860XX 23221300284 545
Sierra Leone 23221341844 https://www.reaxxxxxxxxts.com/
Sierra Leone 23221104397 https://www.reaxxxxxxxxts.com/
Sierra Leone 23221201721 https://www.reaxxxxxxxxts.com/
Sierra Leone 23221341838 https://www.reaxxxxxxxxts.com/
Sierra Leone 23221104344 https://www.reaxxxxxxxxts.com/
Sierra Leone 23221201740 https://www.reaxxxxxxxxts.com/
Calls to a Test Number in Sierra
Leone. 3 Calls all short duration.
(Duration in seconds).
IRSF commences 46 minutes
after calls to Test Number.
This fraud continued for 4 hours
with a loss to the carrier of over
$US 52,000.
Could this have been avoided or
reduced if an alert had been
generated once the Test
Number was called?
Sierra Leone Test
Numbers available on
number reseller’s
website in March 2013.
Sierra Leone Test Numbers
from the same website in
July 2013. Note changes.
Risk Mitigation and
Recommendations
Risk Mitigation and recommendations
Considerations
• IRSF and associated fraud will be around
for foreseeable future
• The lack of Industry progress means
operators to implement strong prevention
and detection
• Law Enforcement action is no deterrent
• Operators who have experienced IRSF are
strengthening their controls, fraudsters are
constantly searching for soft targets.
• What you spend now to implement
controls will be significantly less than you
will lose in an IRSF attack
• IRS Fraudsters do not differentiate
between Prepaid or Post-paid, both are at
risk.
Risk Mitigation and recommendations
Advice
• Question whether you have strong or
sufficient controls in place to prevent or
detect an IRSF attack?
• Remove International Call Forwarding
and multi-party calling capability from
roaming SIM cards
• Encourage mobile users to implement
SIM pin-lock
• Ensure all Business customers have
been advised to check their PBX
security – change default Passwords,
remove DISA facility if not required etc
Risk Mitigation and recommendations
Tools
• Early detection of likely IRSF activity is essential
losses are likely to increase at €10,000 per hour
• Install an automated Fraud Management
System capable of providing you with 24x7
monitoring and correlation to a Test Number
database.
• Consider expansion in FM coverage to look at
the primary frauds
• Subscription Fraud
• SIM Cloning
• Theft of handsets or SIM cards
• PBX Hacking
• Wangiri Fraud
COLIN YATES
FRAUD RISK CONSULTANT
EMAIL: COLIN@YATESFRAUDCONSULTING.COM
PHONE: +64-21 1084447 (NZ) OR +44-7920 870852 (UK)
WWW.YATESFRAUDCONSULTING.COM
Thank You!

Contenu connexe

Tendances

Android+init+process
Android+init+processAndroid+init+process
Android+init+processHong Jae Kwon
 
Modeling application risk at scale @ netflix
Modeling application risk at scale @ netflixModeling application risk at scale @ netflix
Modeling application risk at scale @ netflixScott Behrens
 
Android gps, location services, camera and sensors - Paramvir Singh
Android gps, location services, camera and sensors - Paramvir SinghAndroid gps, location services, camera and sensors - Paramvir Singh
Android gps, location services, camera and sensors - Paramvir SinghParamvir Singh
 
Red Team: Un cambio necesario para la visión holística de la ciberseguridad
Red Team: Un cambio necesario para la visión holística de la ciberseguridadRed Team: Un cambio necesario para la visión holística de la ciberseguridad
Red Team: Un cambio necesario para la visión holística de la ciberseguridadEduardo Arriols Nuñez
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile ApplicationsDenim Group
 
Practical Application of the API Security Top Ten: A Tester's Perspective
Practical Application of the API Security Top Ten: A Tester's PerspectivePractical Application of the API Security Top Ten: A Tester's Perspective
Practical Application of the API Security Top Ten: A Tester's PerspectiveRajniHatti
 
Arquitectura IMS
Arquitectura IMSArquitectura IMS
Arquitectura IMSFrankQ85
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence ServiceF5 Networks
 
Web sockets in Angular
Web sockets in AngularWeb sockets in Angular
Web sockets in AngularYakov Fain
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices Lior Rotkovitch
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationAlienVault
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by defaultSecuRing
 

Tendances (20)

Hacking and Securing iOS Applications
Hacking and Securing iOS ApplicationsHacking and Securing iOS Applications
Hacking and Securing iOS Applications
 
Android+init+process
Android+init+processAndroid+init+process
Android+init+process
 
Modeling application risk at scale @ netflix
Modeling application risk at scale @ netflixModeling application risk at scale @ netflix
Modeling application risk at scale @ netflix
 
Android gps, location services, camera and sensors - Paramvir Singh
Android gps, location services, camera and sensors - Paramvir SinghAndroid gps, location services, camera and sensors - Paramvir Singh
Android gps, location services, camera and sensors - Paramvir Singh
 
Android Location and Maps
Android Location and MapsAndroid Location and Maps
Android Location and Maps
 
Red Team: Un cambio necesario para la visión holística de la ciberseguridad
Red Team: Un cambio necesario para la visión holística de la ciberseguridadRed Team: Un cambio necesario para la visión holística de la ciberseguridad
Red Team: Un cambio necesario para la visión holística de la ciberseguridad
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
 
Practical Application of the API Security Top Ten: A Tester's Perspective
Practical Application of the API Security Top Ten: A Tester's PerspectivePractical Application of the API Security Top Ten: A Tester's Perspective
Practical Application of the API Security Top Ten: A Tester's Perspective
 
Arquitectura IMS
Arquitectura IMSArquitectura IMS
Arquitectura IMS
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 
Android presentation
Android presentationAndroid presentation
Android presentation
 
Web sockets in Angular
Web sockets in AngularWeb sockets in Angular
Web sockets in Angular
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM Installation
 
Hacking techniques
Hacking techniquesHacking techniques
Hacking techniques
 
Telefonía IP (SIP, Diameter, RTP/RTPC)
Telefonía IP (SIP, Diameter, RTP/RTPC)Telefonía IP (SIP, Diameter, RTP/RTPC)
Telefonía IP (SIP, Diameter, RTP/RTPC)
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
 
Sip crash course
Sip crash courseSip crash course
Sip crash course
 
Android Operating System
Android Operating SystemAndroid Operating System
Android Operating System
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
 

En vedette

FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlRichard Hickson
 
Telecom Fraud Detection
Telecom Fraud DetectionTelecom Fraud Detection
Telecom Fraud DetectionPunit Kishore
 
Valutazione Delle Capacità Predittive di un FMS
Valutazione Delle Capacità Predittive di un FMSValutazione Delle Capacità Predittive di un FMS
Valutazione Delle Capacità Predittive di un FMSScattareggia
 
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...Francesco Ciclosi
 
Fraud Management System - ISACA
Fraud Management System - ISACAFraud Management System - ISACA
Fraud Management System - ISACAScattareggia
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISMXINTEC
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraudXINTEC
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
Risques de fraudes et de pertes de revenus
Risques de fraudes et de pertes de revenusRisques de fraudes et de pertes de revenus
Risques de fraudes et de pertes de revenusEric Pradel-Lepage
 
Roaming International - Stratégies
Roaming International - StratégiesRoaming International - Stratégies
Roaming International - StratégiesKEY Dolce
 
Formation Fraud & Revenue Assurance
Formation Fraud & Revenue AssuranceFormation Fraud & Revenue Assurance
Formation Fraud & Revenue AssuranceJean-Marie Gandois
 

En vedette (15)

IRSF
IRSFIRSF
IRSF
 
FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under Control
 
Telecom Fraud Detection
Telecom Fraud DetectionTelecom Fraud Detection
Telecom Fraud Detection
 
Valutazione Delle Capacità Predittive di un FMS
Valutazione Delle Capacità Predittive di un FMSValutazione Delle Capacità Predittive di un FMS
Valutazione Delle Capacità Predittive di un FMS
 
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
 
Fraud Management System - ISACA
Fraud Management System - ISACAFraud Management System - ISACA
Fraud Management System - ISACA
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
Ff46 45 irsf_ic_283762
Ff46 45 irsf_ic_283762Ff46 45 irsf_ic_283762
Ff46 45 irsf_ic_283762
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraud
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
Fraud in Telecoms
Fraud in TelecomsFraud in Telecoms
Fraud in Telecoms
 
Risques de fraudes et de pertes de revenus
Risques de fraudes et de pertes de revenusRisques de fraudes et de pertes de revenus
Risques de fraudes et de pertes de revenus
 
Roaming International - Stratégies
Roaming International - StratégiesRoaming International - Stratégies
Roaming International - Stratégies
 
Formation Fraud & Revenue Assurance
Formation Fraud & Revenue AssuranceFormation Fraud & Revenue Assurance
Formation Fraud & Revenue Assurance
 
Comprendre la fraude irsf
Comprendre la fraude irsfComprendre la fraude irsf
Comprendre la fraude irsf
 

Similaire à International Revenue Share Fraud webinar

FraudStrike
FraudStrike FraudStrike
FraudStrike XINTEC
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeTelcoBridges Inc.
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom FraudJeraSoft
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopParcus Group
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update WebinarcVidya Networks
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENTelcoBridges Inc.
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENAlan Percy
 
Payments 2015 01-29
Payments 2015 01-29Payments 2015 01-29
Payments 2015 01-29Infor
 
Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management systemsflynn073
 
Faudalert_Data_Sheet
Faudalert_Data_SheetFaudalert_Data_Sheet
Faudalert_Data_SheetJuan Illidge
 
Contemporary Frauds.pptx
Contemporary Frauds.pptxContemporary Frauds.pptx
Contemporary Frauds.pptxZiaullahShah9
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQAlan Percy
 
The enterprise of subscription tv piracy
The enterprise of subscription tv piracyThe enterprise of subscription tv piracy
The enterprise of subscription tv piracySabastion Forward
 
Occupational Fraud and Electronic Evidence Investigations
Occupational Fraud and Electronic Evidence InvestigationsOccupational Fraud and Electronic Evidence Investigations
Occupational Fraud and Electronic Evidence Investigationsgppcpa
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudcVidya Networks
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCAlan Percy
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCTelcoBridges Inc.
 
Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyacVidya Networks
 

Similaire à International Revenue Share Fraud webinar (20)

FraudStrike
FraudStrike FraudStrike
FraudStrike
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
Telecom Revenue Assurance Workshop
Telecom Revenue Assurance WorkshopTelecom Revenue Assurance Workshop
Telecom Revenue Assurance Workshop
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update Webinar
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
Payments 2015 01-29
Payments 2015 01-29Payments 2015 01-29
Payments 2015 01-29
 
Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management system
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
Faudalert_Data_Sheet
Faudalert_Data_SheetFaudalert_Data_Sheet
Faudalert_Data_Sheet
 
Contemporary Frauds.pptx
Contemporary Frauds.pptxContemporary Frauds.pptx
Contemporary Frauds.pptx
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
The enterprise of subscription tv piracy
The enterprise of subscription tv piracyThe enterprise of subscription tv piracy
The enterprise of subscription tv piracy
 
Occupational Fraud and Electronic Evidence Investigations
Occupational Fraud and Electronic Evidence InvestigationsOccupational Fraud and Electronic Evidence Investigations
Occupational Fraud and Electronic Evidence Investigations
 
Hacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraudHacking PBXs for international revenue share fraud
Hacking PBXs for international revenue share fraud
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidya
 

Dernier

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Dernier (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

International Revenue Share Fraud webinar

  • 1. International Revenue Share Fraud Webinar Colin Yates Yates Fraud Consulting Ltd. Roaming and IRSF Webinar – 3 December 2013
  • 2. Webinar Agenda • Introduction to IRSF • Recent case studies • Law Enforcement action re IRSF • Introduction to IRSF – 5 Stages • IPR Number Resellers • Number Misappropriation (Hijacking) • Industry initiatives to reduce IRSF losses • Industry’s contributing factors to IRSF • Risk mitigation & recommendations • Q & A
  • 3. Introduction to IRSF • There are a number of definitions available to describe IRSF A simple description would be: ‘Using fraudulent access to an Operators network to artificially inflate traffic to numbers obtained from an International Premium Rate Number Provider, for which payment will be received by the Fraudster (on a revenue share basis with the number provider) for every minute of traffic generated into those numbers.’
  • 4. IRSF What is our view of the fraudster?
  • 6. Case Study No. 1 USA • Small USA network operator providing service to SME’s – 2 PBX’s hacked with IRSF losses of $US160,000 suffered over a 30 hour period – Their carrier discovered fraud and served immediate notice that they required full payment within 48 hours • Carrier unable to pay and only option was to close down • Asked for my assistance and was able to provide sufficient information to get debt reduced with time to pay • Confirmation that IRSF will impact any operator, irrespective of size, location or services offered, and losses could have been significantly reduced by effective Risk Mgt
  • 7. Case Study No. 2 Handset Theft - Barcelona • Major issue impacting many operators who have customers roaming in Spain – Barcelona well known as the ‘Pickpocket’ capital – Since Jan 2013, an average of 260 mobiles per month have been stolen and the Simcards used for IRSF – All 4 Spanish networks being used, losses per Simcard are averaging €10,000 per hour • Fraudsters using combination of International Call Forward, multi party calling, and associated PBX Fraud • Also discovered that some roamers are selling their mobiles for €500 and then reporting them stolen later!
  • 8. Law Enforcement action for IRSF • We cannot rely of Law Enforcement to investigate IRSF, prosecute fraudsters and seek reparation for operators • Investigating IRSF is complex, typically extending across 3 or 4 international borders • Simply determining jurisdiction will be a challenge • A recent USA IRSF investigation took almost 3 years to complete by an operator and federal agency task force • Principals were arrested in Malaysia for IRSF involving tens of millions of dollars • Before extradition could be arranged, fraudsters were bailed and fled to Pakistan.
  • 9. The 5 Basic steps to IRSF 1 Access a Network 2 Obtain IRSF numbers 3 Generate the calls 4 Receive payment 5 Determine loss
  • 10. 1. Access to a Network • Fraudster must obtain the means to make these calls • To maximise income, preferably at no cost to Fraudster • Common ‘Primary Frauds’ to gain access are; – Subscription Fraud – SIM Cloning – Theft of handsets or SIM cards – PBX Hacking – Wangiri Fraud – Arbitrage (Requires the exploitation of a bundled or discounted tariff offering calls at less cost than any IRS pay-out offered)
  • 11. 2. Obtain IRSF Numbers • Fraudster may have existing relationship with IPRN Provider • If not, will search Internet to find one • Obtains a ‘Test Number’ from Reseller website • Will chose a destination with good pay-out (Latvia €0.17c) • Calls Test Number to confirm a call will connect • Once confirmed, will request numbers from IPRN Provider • Request will include an estimate of minutes to be generated • Will include his bank account details so that funds based on minutes generated can be credited every 7 to 30 days
  • 12. 3. Generate traffic • Once IRS numbers issued, Fraudster starts generating calls • To maximise revenues, Fraudster will utilise network services to generate overlapping, simultaneous calls • Such services will include International Call Forwarding, Multi-Party calling, combining PBX with C/Fwd mobile Sim • Fraudster will continue this activity until originating number range owner becomes aware of fraud and blocks access • Typically the Fraudster will then move to another fraudulent access and continue calling additional numbers providing by the IPR Number Provider
  • 13. 4. Receive payment • In most circumstances the originating number range holder is required to make payment for this fraudulent traffic – Existing Roaming or Interconnect agreement requirement • Initial payment made to roaming or interconnect partner • Payment continues down value chain to reach the terminating number range owner • Terminating operator retains his share and pays IPRN Provider • IPRN Provider shares this balance by paying the Fraudster (e.g. €0.17c per minute for calls to Latvia) and retaining the balance.
  • 14. 5. Determining loss • Originating Number range holder has made full payment • In case of Subscription or other SIM based fraud, little or no chance of recovering this from the fraudster. • In case of PBX Fraud, typically the network provider will attempt to recover cost of fraud from the PBX user • In many cases this will result in a dispute, unwanted publicity and customer churn unless network provider accepts all or part of this loss • PBX user will typically argue that their network provider should have discovered such a huge increase in calling activity • All other transit operators, IRS Number owner, number reseller and fraudster have benefited from this fraud
  • 15. IPR Number Resellers • Number of Resellers continues to increase: – 17 in 2009 – 47 in 2012 – 85 in October 2013 • 400% increase in 4 years • Most of this increase results in those wanting to exploit IRSF revenues • Many now acting as Number Wholesalers
  • 16. Number Misappropriation (Hijacking) • Usually involves Country numbers with high termination rates – e.g Small Island nation at $US0.65c • Fraudsters will act in collusion with a dishonest carrier • Advertise ‘below cost’ rates into country to attract operators looking for Least Cost Routing (LCR) • Calls will be routed in a certain direction to ensure that they hit the ‘dishonest operators’ network • Once there, they will be filtered out and ‘short-stopped’ outside the • Payment follows the same value chain as the call routing
  • 17. Industry initiatives to reduce IRSF losses • Very little industry progress to stop IRSF/Hijacking • ITU misuse reporting is not being supported • I3 Forum has published guidelines, but again, these are not being supported by all of their membership • BEREC have issued guidelines re with-holding payment however these apply only to European operators and are complex • Continued lack of cooperation within the operator community • Regretfully, the Fraudsters appear to be better organised to take full advantage of industry weaknesses
  • 18. Industry’s ability to implement initiatives for steps 1 – 5 of IRSF 1 Access a Network 2 Obtain IRSF numbers 3 Generate the calls 4 Receive payment 5 Determine loss
  • 19. 1 – Access to a network  Subscription Fraud and it’s variations can be reduced with effective Fraud Management Systems  SIM cloning can be eliminated by upgrading algorithm  PBX Fraud can be reduced by implementing fraud awareness programs and audits for business customers  Arbitrage can be avoided by ensuring that risk reviews are completed on all new products, services and tariffs  Invest in a fraud management solution However controls must be relative to preventing fraud while minimising customer impact.
  • 20. 2 – Obtaining IPR Numbers  IPR Number Resellers have increased by 400% since 2009  85+ are now competing to attract fraudsters to them  Up to 75% of fraudsters embarking on an IRS Fraud will call a Test Number, provided by the Reseller first.  Most of these Test Numbers are now available in a database as an IRSF detection tool Implement a cost effective Fraud Management System which uses a Test Number Database as a hotlist. This alerts a CSP to a potential IRSF incident and has already shown benefits.
  • 21. 3 – Generate traffic  Reduce the opportunity for fraudsters to maximise revenues by; – Removing International Call Forwarding and Multi Party calling from roaming customer SIM’s – Ensure that automated systems are in place to analyse NRTRDE records 24x7 and refer alerts to analysts – Ensure automated systems are in place to notify analysts 24x7 of calls to known IRSF destinations Up to 87% of all reported IRSF occurs between 8.00pm Friday and 8.00am Monday. If the fraud function does not operate during this period, alternatives must be identified.
  • 22. 4 – Receive Payment  Early identification of IRSF does provide opportunities to negotiate payment withholding by partners  Position is strengthened if impacted operator is able to confirm that IRSF losses relate to a hijacked number range The earlier an incident is identified, the less the fraud loss will be, so early detection is critical.
  • 23. 5 – Determining Loss  In most situations, it will be the originating number owner who will suffer the loss for IRSF, and it is their responsibility to ensure that they have systems and processes in place to minimise these losses.  Accurate reporting with evidential information is essential to identifying true losses, enabling future accurate detection/prevention through knowledge transfer. Fraud management solutions have good reporting capabilities and will support the creation of future intelligence in the fight against IRSF.
  • 24. IRS Test Number Database (PRISM)
  • 25. IRS Test Number Database (PRISM) • YFCL are monitoring the IPR Number Reseller websites and developed an IRS Test Number Database (PRISM) • This database currently contains over 25,500 test numbers – PRISM has been made available on a subscription basis to operators since the 21 August 2013 – It is used as a ‘hot-list’ within an FMS to alert operators when a Test Number has been called – It has proved to be very effective at identifying IRSF • Xintec are the only FMS Provider licenced to offer PRISM free as a hot list within their FMSevolution product.
  • 26. Example of IRSF Test Numbers Date Time A Number B Number Call Duration 30/03/2013 05:17:33 XXX977860XX 23221104397 7 30/03/2013 05:32:14 XXX977860XX 23221104397 5 30/03/2013 05:57:22 XXX977860XX 23221104397 5 30/03/2013 06:03:41 XXX977860XX 23221300284 19 30/03/2013 06:13:55 XXX977860XX 23221300284 601 30/03/2013 06:13:57 XXX977860XX 23221300284 581 30/03/2013 06:13:58 XXX977860XX 23221300284 538 30/03/2013 06:13:58 XXX977860XX 23221300284 551 30/03/2013 06:14:01 XXX977860XX 23221300284 576 30/03/2013 06:14:01 XXX977860XX 23221300284 592 30/03/2013 06:14:02 XXX977860XX 23221300284 543 30/03/2013 06:14:03 XXX977860XX 23221300284 575 30/03/2013 06:14:05 XXX977860XX 23221300284 530 30/03/2013 06:14:06 XXX977860XX 23221300284 593 30/03/2013 06:14:07 XXX977860XX 23221300284 498 30/03/2013 06:14:07 XXX977860XX 23221300284 588 30/03/2013 06:14:08 XXX977860XX 23221300284 545 Sierra Leone 23221341844 https://www.reaxxxxxxxxts.com/ Sierra Leone 23221104397 https://www.reaxxxxxxxxts.com/ Sierra Leone 23221201721 https://www.reaxxxxxxxxts.com/ Sierra Leone 23221341838 https://www.reaxxxxxxxxts.com/ Sierra Leone 23221104344 https://www.reaxxxxxxxxts.com/ Sierra Leone 23221201740 https://www.reaxxxxxxxxts.com/ Calls to a Test Number in Sierra Leone. 3 Calls all short duration. (Duration in seconds). IRSF commences 46 minutes after calls to Test Number. This fraud continued for 4 hours with a loss to the carrier of over $US 52,000. Could this have been avoided or reduced if an alert had been generated once the Test Number was called? Sierra Leone Test Numbers available on number reseller’s website in March 2013. Sierra Leone Test Numbers from the same website in July 2013. Note changes.
  • 28. Risk Mitigation and recommendations Considerations • IRSF and associated fraud will be around for foreseeable future • The lack of Industry progress means operators to implement strong prevention and detection • Law Enforcement action is no deterrent • Operators who have experienced IRSF are strengthening their controls, fraudsters are constantly searching for soft targets. • What you spend now to implement controls will be significantly less than you will lose in an IRSF attack • IRS Fraudsters do not differentiate between Prepaid or Post-paid, both are at risk.
  • 29. Risk Mitigation and recommendations Advice • Question whether you have strong or sufficient controls in place to prevent or detect an IRSF attack? • Remove International Call Forwarding and multi-party calling capability from roaming SIM cards • Encourage mobile users to implement SIM pin-lock • Ensure all Business customers have been advised to check their PBX security – change default Passwords, remove DISA facility if not required etc
  • 30. Risk Mitigation and recommendations Tools • Early detection of likely IRSF activity is essential losses are likely to increase at €10,000 per hour • Install an automated Fraud Management System capable of providing you with 24x7 monitoring and correlation to a Test Number database. • Consider expansion in FM coverage to look at the primary frauds • Subscription Fraud • SIM Cloning • Theft of handsets or SIM cards • PBX Hacking • Wangiri Fraud
  • 31.
  • 32. COLIN YATES FRAUD RISK CONSULTANT EMAIL: COLIN@YATESFRAUDCONSULTING.COM PHONE: +64-21 1084447 (NZ) OR +44-7920 870852 (UK) WWW.YATESFRAUDCONSULTING.COM Thank You!