Voice Firewall
Cellusys Call Control is a solution that provides a single point in the network to detect and prevent voice fraud such as IRSF, wangiri, and SIM boxes, and provide centralised call visibility for business intelligence based on realtime control of call setup and management.
- Centralised voice fraud control
- Realtime detection and prevention
- Visibility for business intelligence
- Reduced operational complexity
- Simple integration
Impact of call fraud
Subscriber privacy is violated and sensitive info exposed. Subscribers lose trust and move to alternate channels. The network assumes the costs of fraudulent charges which cannot be billed. Arbitrage and shortstopping abuse wholesale agreements causing huge losses to the targeted network, and loss of billable roaming revenue increases costs while depleting revenues. Call fraud is more than an nuisance to subscribers, and has real financial impacts for mobile network operators.
THREAT TYPES
IRSF
IRSF International Revenue Share Fraud is the most commonly reported voice fraud, costing over 5 billion annually. IRSF inflates traffic to high cost international destinations by tricking subscribers to call these destinations by using techniques such as wangiri, PBX Hacking, or stolen devices. The calls may be short stopped, benefiting both the perpetrating network and the shortstopping network.
SIM BoX
SIM box is a type of call fraud used to route calls between networks without paying agreed interconnect fees. SIM boxes can be physical devices with multiple SIM cards used to terminate calls on the victim network, or can be an application that uses subscribers’ phones and service to terminate calls and SMS on the victim network. This re-routing of traffic costs MNOs 6.8 billion per year. The call recipient receives the call from a local number, and the operator is defrauded of the value of the interconnect rate that has been bypassed.
Spoofing
Spoofing occurs when the interconnect service provider changes the calling line identity (CLI) of a call to a local number, resulting in no interconnect revenue to the receiving operator.
Detection
Applying pattern analysis and recognition to the processing of the signalling related to call setup and management, as well as roaming status checks, these various call fraud methods can be categorised for further action.
Wangiri
Wangiri is commonly referred to as “missed call” or “one ring” fraud. Wangiri costs operators around 1.3 billion annually and is frequently used as a means of generating traffic for IRSF fraud. The perpetrator calls the victim but ends the call before the call is answered. This incites the victim to redial the missed number, at a high cost to the subscriber. The perpetrating network benefits from the minutes generated and either the subscriber or the home network is responsible for the cost.
Flash Calls
Flash Calls are an alternative to SMS as a method of 2 factor authentication (2FA). A call is placed from a particular number range, and the application immediately recognises some digits of this phone number as the authentication code. The call is not answered and therefore generates no revenue for the receiving network. This depletes valuable A2P SMS revenue, and the cost to operators can not yet be estimated.
FMS Integration
CCC provides APIs to allow immediate action to be taken with integrated fraud management systems, provided by Cellusys or by the operator.
Prevention
Incoming fraudulent calls can be blocked and outgoing calls to fraudulent destinations can be prevented, saving subscribers from fraudulent charges and protecting valuable revenue streams to the operator.
Accessible Reporting
Flexible
From the first day of deployment, pre-defined rules ensure all known threats are blocked. From here, the rules engine, using advanced matching algorithms, not only detects the threats but also provides valuable intelligence in real time, assisting security teams to actively stop any new undefined threats and identify the source.
New policies can be created and implemented immediately without relying on third parties or software updates. Users have full access to the protocol, and can easily customise the flexible rules engine via the user-friendly web interface to implement broad policies as well as attain fine-grained control.
Signalling Providers and Signalling Hubs
Signalling is your business — at least make it secure.
We have provided many Tier1 signalling hubs with the capability to control and secure their signalling.
Learn more about
SS7 Firewall
How secure is your network?
Learn more about our
Managed Service for Security
WE INSTALL, WE MANAGE, YOU WIN
See a Demo
Take us for a spin
See about a demo of Cellusys Anti-Fraud products