article thumbnail

Do Not Originate (DNO) List: What It Is and Why VoIP Resellers Should Care  

VoIP MS

In the same way, DNO lists can include disconnected or unused numbers that are often used in spam calls – any call spoofing one of those numbers is almost certainly illegitimate and can be safely blocked. Deploying DNO blocking not only protects the public but also benefits networks and resellers.

article thumbnail

Top Telecom Fraud Trends in 2025: Evolving Threats & Solutions

Subex Blog

Fraudsters exploit vulnerabilities in telecom networks to reroute international calls as local ones, thereby evading international tariffs. Bypass fraud results in substantial financial losses by evading international tariffs and rerouting calls.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SIMBox Fraud: Challenges and AI-Powered Solutions for Telecom Operators

Subex Blog

At its core, SIMbox fraud (also known as interconnect bypass fraud ) exploits the price disparity between local and international call rates. Fraudsters use a device called a SIMbox, which contains multiple SIM cards purchased from various mobile network operators (MNOs). These SIMs act as the gatekeeper for international calls.

article thumbnail

Unveiling the Power of AI in Telecom Fraud Detection

Iconxsolutions

Anomaly Detection Systems in Action AI based anomaly detection systems can capture the highly complex informational structure within the data, to be able to learn the numerous call patterns that typically occur. Any calls that appear to deviate from these patterns are flagged as atypical, and can be assessed by an analyst.