menu-close
search-icon
banner

All posts by Kiran

5 Key Reasons Why Telcos Should Turn to Digital Methods to Combat Fraud

Telcos are losing millions of dollars every year to frauds. Of late, we see that fraudsters have become smarter and the tactics used by them have evolved into a more sophisticated level aided by the smart technologies. Further, with digital services entering the new mix of offerings, traditional strategies no longer fit the bill. Digital services, especially those offered on IP networks, are more susceptible to attacks as evident from the recent hike in SIP-based attacks.

The growing complexity in the digital services ecosystem demands a future-proof approach to secure the networks and prevent revenue losses.

Let’s look at the top five reasons why you should invest in digital fraud prevention technologies.

  1. Proactive versus Reactive

Traditional fraud management systems are post facto; they rely on transaction records such as CDRs, payment vouchers, provisioning details, etc., which are generated post an event. Hence, fraud teams can never get ahead of an attack and can only react to it. However, with digital methods, the network is monitored in near real time and fraud teams can tear down a call and prevent frauds before they occur.

  1. Increased coverage to prevent frauds

SIP attacks are inherently complex; they range from Layer 3 based IP attacks, all the way to Layer 7 based SIP protocol attacks. All of the Layer 3 attack reconnaissance need not translate to a breach, but by keeping track of the origination of these attempts and then correlating it to high-risk behavior at the higher network layers, modern digital fraud prevention techniques can automatically prevent such attacks.

  1. Combat Zero-Day Threats

Of late, fraudsters are increasingly exploiting the vulnerabilities in fraud detection mechanisms and duping the system with malicious inputs. To avert such frauds, you need to employ an intelligent system that can detect such attacks in real time and prevent them before they impact the customers. With advanced Machine Learning (ML), you can create a defense against such attacks and future-proof the algorithm.

  1. Scenario Planning

Security and Fraud is an afterthought while new digital products are launched by telcos as the focus is initially on product functionality and the rush to go to market. This makes new digital services highly susceptible to attacks and breaches which are more often than not exploited very quickly by fraudsters. It is important that new digital services are put through vulnerability assessments and scenario planning so that obvious holes are plugged, and then continuous monitoring is put in place to detect any new threats to ensure profitability and prevent revenue leakages from fraud.

  1. Future Proofing to address the complex scenarios

As the digital framework grows complex, threat management becomes even more challenging.  With advanced ML capabilities, the new threat management systems allow you to gather threat intelligence from across the globe covering a wide range of digital products. This will help you identify new trends and malicious patterns. Further, it also gives insights on the specific tools and tactics employed by hackers, so you can bolster the system well in advance.

Stay tuned to get more updates from Subex.

To know more about our Digital Fraud prevention Solution Click here !

Don’t Be In the News for Wrong Reasons: Stay Ahead of Cyber Attacks

It is a well-known fact that, every time a security threat occurs in any organization, it makes it to the media and thus causing reputation damage and loss of business. We have seen many instances of such cases in the recent past.

In fact a very recent case, which was reported in the beginning of the year was with Vermont utility. According to news reports, which later proved to be false, Burlington Electric had found malicious software on a computer that was not connected to its grid control systems. Moreover, the malicious software found on Burlington Electric Company laptop matched with those on malware found in the Democratic National Committee computers that the US government has blamed on a specific country.[i]

Though the news was later debunked to being ‘erroneous’[ii], the news was initially covered in a multitude of news outlets. The fact remains that cybersecurity attacks continue to make news, negatively attack your business and brand reputation.

Unfortunately, the ground reality is that Hacking attempts are becoming more common, and the rollout of new technologies has created further vulnerabilities. It is important that businesses safeguard themselves in order to ensure that they stay out of negative limelight. In January 2014, Target admitted that hackers used malicious software to break into its networks and access credit and debit card information directly from Target’s checkout lanes through the holiday shopping season. News of the breach drastically affected the retail giant diminishing holiday sales causing Target to eventually fire its CEO in the breach’s wake. The hackers responsible for the 2013 Target data breach that exposed payment information on 40 million customers had nothing to stop them from accessing every cash register in every Target store.[iii]

Today with the world going ‘digital’, the number of potential devices, just waiting to be hacked are increasing. Experts predict that by 2020 there will be 200 billion connected devices, which in turn could result into increased probability of devices being vulnerable to such attacks.

We are also witnessing the rise of smart cities. For Instance, Saudi Arabia is investing $70 million to build four new smart cities, while in South Africa, a $7.4 billion smart city project is already underway. By 2020, the market for smart cities is predicted to reach $1 trillion, according to Frost & Sullivan, a consulting firm.[iv]

In such a scenario, imagine the magnitude of an attack on smart cities or connected infrastructure, which has implications on citizens. The negative impact this could have on brand reputation of state governments could be devastating. But an attack is indeed, possible. Last year, Cesar Cerrudo, an Argentine security researcher and chief technology officer at IOActive Labs, demonstrated how 200,000 traffic control sensors installed in major hubs like Washington; New York; New Jersey; San Francisco; Seattle; Lyon, France; and Melbourne, Australia, were vulnerable to attack. Mr. Cerrudo showed how information coming from these sensors could be intercepted from 1,500 feet away — or even by drone — because one company had failed to encrypt its traffic.[v]

Hence, it is important today for organizations and even government bodies to ensure that they are able to safeguard themselves from cyberattacks. Such vulnerabilities have huge implications on business and can cause irreparable damage to brand reputation. Stay ahead of cyber threats and, as the headline say, don’t be in the news for the wrong reasons.


[i] https://edition.cnn.com/2016/12/30/us/grizzly-steppe-malware-burlington-electric/

[ii] https://www.utilitydive.com/news/what-electric-utilities-can-learn-from-the-vermont-hacking-scare/433426/

[iii] https://www.ibtimes.com/target-hackers-had-access-all-chains-us-cash-registers-2013-data-breach-report-2106575

[iv] https://bits.blogs.nytimes.com/2015/04/21/smart-city-technology-may-be-vulnerable-to-hackers/?_r=0

[v] https://bits.blogs.nytimes.com/2015/04/21/smart-city-technology-may-be-vulnerable-to-hackers/?_r=0

Get Started with Subex