How do you effectively tackle bypass fraud today?
Bypass fraud is still a major concern for mobile operators worldwide. Far from having disappeared, fraudsters have developed new techniques to protect their 'business'. They have implemented tactical responses against the main detection methods: (a) Profiling analysis performed in Fraud Management System, (b) Tracking campaigns based on Test Call Generation.
Are you aware that the traditional Profiling thresholds are now seriously challenged by fraudsters?
Fraudsters are able to simulate human behaviour by using the SIM server technology and the advanced features of last generation SIM boxes: automated data transactions, automated calls to the voicemail, incoming call redirection to a human operator... This additional noise generated on top of the fraudulent traffic makes the profiling a much more difficult task.
In some countries, fraudsters simply lend SIM cards to genuine subscribers and are able to mix fraudulent and legitimate traffic by sharing the usage of these lines. They also sometimes directly clone the SIM cards of genuine subscribers.
Do you know that some fraudsters are able to counter-detect and block your Tracking campaign?
Basic Tracking campaigns, mainly based on a high volume of test calls, are no more efficient as fraudsters can now manage 'black-lists' and block the traffic to the test numbers of the Tracking campaign. Test numbers are black listed on the basis of well-known indicators: number of call attempts during a specific timeframe, number of short connects during a specific timeframe...
Reversely, other fraudsters manage 'white lists': they implement routing policies enabling them to route traffic through a SIM box only if the called number has been previously white listed; otherwise the traffic is routed through white routes.
So have the fraudsters won this war?
Definitely, the answer is NO!
First, because the techniques / technologies used by fraudsters are well-known by fraud experts; so it is possible to act accordingly.
Second, many operators have already successfully implemented best practices, such as: combine the main detection methods, keep aware of new trends and be as flexible as fraudsters, always challenge your existing solution and map it against up-to-date risks.
Why Araxxe is the right partner to help you optimize your bypass detection process?
We design advanced test campaigns optimizing bypass detection performance while addressing the risk of counter-detection.
You take advantage of Araxxe global test platform, including a large portfolio of routes and international telecom subscriptions.
We operate flexible test campaigns delivered in an industrialized way and optimized on a daily basis by Araxxe fraud analysts.
We team with you to further integrate all your bypass detection solutions in order to create new synergies out of them.
You leverage Araxxe unique expertise in both test campaign design and bypass fraud detection.