Caller ID Spoofing and Robocalling

CLI Spoofing & Robocalling

Prevent Caller ID spoofing Scams and Robocalling Fraud

Caller ID spoofing, a scam to steal money or personal information

Most of today’s phone handsets allow users to view the telephone number of the person calling before they answer. This feature - known as 'Caller ID' or 'Calling Line Identity' (CLI) - is a convenient way to allow subscribers to make an informed decision whether they want to answer the call. However, callers and criminals now can deliberately change the Caller ID to appear as a trusted entity.

This deceptive practice, also known as 'spoofing', is intended to commit impersonation fraud, inter-carrier wholesale fraud, as well as to practice spam based on pre-recorded messages, often telemarketing phone campaigns.

RAID, a targeted approach to CLI spoofing and Robocalling

RAID for CLI spoofing & Robocalling module uses a prebuilt rule-based approach powered with AI-based anomaly detection, to uncover advanced fraud threats.

RAID adds an extra layer of protection to better protect your customer base against nuisance calls by delivering a targeted approach to CLI spoofing and Robocalls. As part of our solution, Mobileum provides automatic mechanisms to block calls within your network as well as call-filtering services.

See how Mobileum can help protect & grow your business

Over 750 Telecom companies, in more than 150 countries, are scaling their business with Mobileum solutions.

The Pre-Packaged Approach To Fight Against CLI Spoofing

RAID is a pre-packaged solution that allows CSPs to evaluate their network traffic and detect fraudulent behaviors and deviations of subscriber usage.

The solution makes use of a complex rule library combined with machine learning techniques on top of a wide range of data such as CDR information, signaling (SS7 and Diameter) as well test call generator (TCG) analysis to detect this fraud.

RAID for Fraud Management is Powered by Mobileum's Active Intelligence Big Data Analytics Platform

Case Management
Drill down on data and alerts with ad-hoc analysis to find the root cause of fraud and make better decisions faster.
Fully configurable
Use easy-to-apply configurations, workflows, and dashboards to enable simple and transparent mirroring of your required business processes. Automations and migrations let you execute this in days instead of months
Machine Learning
React to and stop known and unknown fraud patterns in a repeatable and auditable way by combining an extensive rules library with machine learning.
All-In-One Software
Manage the telecom fraud management lifecycle autonomously, from data loading to mitigation actions, with Active Intelligence's complete suite of tools for fraud analysts.
Link Analysis
Quickly uncover fraudulent activities by highlighting key individuals, connections and patterns in a uniquely visual way. Gain a deeper understanding of data within a different entity and relationship types, as well as attributes that can help uncover hidden fraud patterns.
Big Data Analytics
Adopt stream data integration as part of your data management strategies for real-time integration and analytics. Address the problem of matching continuously income events to evolving fraud patterns with Active Intelligence's complex event processing (CEP). Accelerate fraud detection and react faster to emerging threats with real-time data stream analysis.

Robocalls lead the list for false caller ID

Robocalls are the leading and most recognized voice security issue for communication service providers and their subscribers, with over 85 billion robocalls placed worldwide in 2018 (Global Robocall Radar Report, 2018). The term “robocall” refers to a broad class of nuisance and malicious calls, which include automated telemarketing/voice SPAM, impersonation scams, voice phishing (vishing), social engineering, and harassing calls. Robocalls and scam calls aren't only annoying, they are often illegal and a threat to subscriber’s security and privacy.

Some calls in these categories are conducted manually while others are hybrid, involving an automated and a human component. If subscribers are getting a high volume of sales and marketing related phone calls, odds are the majority of those calls are illegal - many being scams to commit fraud.

Fraud & Security Case Study

How an integrated approach to fraud and security enhanced fraud protection in a Tier-1 Communication Service Provider.

How does Caller ID spoofing increase the Robocalling fraud problem?

Caller ID spoofing, also known as phone number spoofing, is the practice of placing a call from a phone number other than the actual phone number you are calling from. By spoofing a phone number, nearly anyone can call using:
  • Blocked Caller ID
  • “No Caller ID”
  • Un-allocated phone numbers
  • Manipulated Caller ID
  • Unknown Caller ID
  • Random Phone Numbers
  • Phone Numbers from Local Area Codes
  • Even the Recipient’s Phone Number!

Protection against Robocalling spam and fraud schemes

Caller ID spoofing allows robocallers to hide behind other phone numbers and disguise their identity. In June 2019 ruling by the United States Federal Communications Commission (FCC), carriers were cleared to offer consumers the choice to opt-in to more advanced tools, such as an ability to block calls, not on their contact list. With this action, robocall fraud complaints have been declining, however, scams are getting more sophisticated and costly. The Mobileum fraud management solution monitors some of these critical areas:
  • Robocalling traffic profiling
  • Calling number scoring algorithms
  • Detection of manipulated Caller ID
  • Blacklist management
  • Number ranges validation
  • Digital signature validation through STIR/SHAKEN standards

An end-to-end approach from Fraud Prevention to Call Blocking

Using IP technology, fraudsters are able to generate false calling party information and pass it into the PSTN via SS7. Attackers can get connected with a carrier using either SS7 or VoIP and then exploit the lack of caller ID authentication between carriers to spoof the caller ID.

Combined with the Mobileum Fraud Management System (FMS), the Mobileum voice firewall can sort good traffic from bad, block unwanted calls, and keep a carrier’s voice network safe and secure from attack.

Mobileum Risk Management Software Portfolio

Discover why Mobileum is the most trusted software vendor by Telecom companies all over the globe to manage their Revenue Assurance activities.

A proactive approach to CLI Masking

Scammers often use caller ID spoofing to mask their true location, making calls appear as if they are coming from a legitimate or local number to increase the odds that subscribers will answer the call.

Using Mobileum’s test call generator (TCG), international calls can be made with the results of potential fraud processed automatically on our fraud management system. As part of the Mobileum CLI spoofing fraud detection package, TCG commands and result analysis for validation of the detected spoofed numbers being used for robocalls are provided.

Co-engineered to leverage fraud and security contextual analysis

Along with CDRs, SIP signaling messages are processed in the Mobileum RAID system in real-time to control calls, texts, data and more. For example, in Wangiri fraud scenarios RAID can monitor a high number of SIP invite and cancel messages from the same CLI.

In addition, RAID can look at the dispersion of called numbers from a single origin and a dispersion of calls back to the same destination number. With this, carriers can detect fraud attacks at the first attempt and take appropriate preventative measures.

Future-Proof Your Fraud Management Strategy By Adopting Machine Learning

Rule-Based Approach
An extensive rules library provides immediate fraud awareness and increased accuracy
  • Optimize rules according to your needs
  • Greater accuracy and lower error rate
  • Immediate results
AI/Machine Learning
AI and Machine learning algorithms leverage data analysis processes to detect deviations and unknown fraud patterns
  • Rapid prediction and processing analysis
  • Past customer behaviors evaluation
  • Unlimited traffic analysis
Act
Our voice, data and SMS firewalls are fully integrated with our anti-fraud system
  • Real-time blocking
  • Fraud & Security contextual analysis
  • Wide range of fraud type protection

Resident hotlists for superior fraud protection

RAID:FMS is prebuilt with integration to several types of hotlists for fraud detection contextual analysis. For example, the RAID:FMS has a repository of high-risk call destinations, allocated and un-allocated number ranges in addition to databases that maximize the effectiveness of fraudulent contextual analysis. Furthermore, machine learning techniques combined with the regular database updates catalog known and emerging attack signatures so attacks can be quickly identified and defeated.

Top 6 Key threats arriving from CLI Spoofing and Robocalling

Spoofing & Impersonation
Spoofing enables a long list of illegal activities from impersonation attacks, to account takeovers and financial fraud. Even more worrisome are illegal robocalls -- posing as trusted callers, such as the IRS -- that intend to manipulate consumers out of their money.
Spam Calls
Despite anti-robocall legislation, scammers and spammers are continuously finding new methods to make robocalls. Spam calls erode people’s trust in phone communication. This impacts phone-based communication with both peers and businesses.
Customer Experience
Blocking unrecognized numbers creates dangerous issues for subscribers, businesses and service providers with legitimate calls from trusted sources going unanswered.
Impact on Customer Care
On average, in the US alone there are 182 million robocalls made per day or 2,115 per second. As subscriber complaints increase to local authorities, they also increase to the mobile operator’s customer care center.
Brand Perception
Mobile communications are intended to make life easier. When the majority of a subscriber’s incoming calls are scams, consumers lose trust in the carrier who provides service.
Toll-Free Traffic Pumping
Traffic pumping in Toll-Free occurs when one party generates a volume of calls (usually using a robot-dialer) to a particular Toll-Free number for the purpose of generating revenue from a Toll-Free subscriber or one of the providers in the call path.