C3Subtitles: 35c3: Exploring fraud in telephony networks
back

Exploring fraud in telephony networks

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
01:02:04
Language
English
Abstract
Telephone networks form the oldest large scale network that has grown to
touch over 7 billion people. Telephony is now merging many complex
technologies (PSTN, cellular and IP networks) and enabling numerous
services that can be easily monetized. However, security challenges for
telephony are often neither well understood, nor well addressed. As a
result, telephone networks attract a lot of fraud. In this talk, we will
systematically explore the fraud in telephone networks, focusing on
voice telephony. We will present a taxonomy of fraud, and analyze two
prevalent fraud schemes in more detail: looking into the ecosystem of
International Revenue Share Fraud (IRSF), and discussing a new
countermeasure to the well-known problem of voice spam.

This talk aims to improve the understanding of the fraud ecosystem in
telephony networks. We first provide a clear taxonomy that
differentiates between the root causes, the vulnerabilities, the
exploitation techniques, the fraud types and finally the way fraud
benefits fraudsters.

As concrete examples, we first look into International Revenue Share
Fraud (IRSF), where phone calls to certain destinations are hijacked by fraudulent operators and diverted to the so-called ‘international premium rate services’. This fraud often involves multiple parties who collect and share the call revenue, and is usually combined with other
techniques (such as voice scam, mobile malware, PBX hacking) to generate call traffic without payment. We will further explore the IRSF ecosystem by analyzing more than 1 million `premium rate' phone numbers that we collected from several online service providers over the past 3 years.

In the second part, we will look into voice spam, a prevalent fraud in
many countries. After giving an overview of various types of unwanted phone calls, we will focus on a recent countermeasure which involves connecting the phone spammer with a phone bot (“robocallee”) that mimics a real persona. Lenny is such a bot (a computer program) which plays a set of pre-recorded voice messages to interact with the spammers. We try to understand the effectiveness of this chatbot, by analyzing the recorded conversations of Lenny with various types of spammers. As we consider the ‘benefits’ as a fundamental part of our fraud definition, we believe that chatbots can be combined with the existing fraud detection and prevention mechanisms, as a supplementary way of slowing down voice spam campaigns.

Talk ID
9852
Event:
35c3
Day
2
Room
Clarke
Start
11:30 a.m.
Duration
01:00:00
Track
Security
Type of
lecture
Speaker
Merve Sahin
Aurélien Francillon
0.0% Checking done0.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
100.0% Nothing done yet100.0%

English: Transcribed until

Last revision: 4 months, 3 weeks ago