International Revenue Share Fraud (IRSF) – A threat operators cannot ignore.

In the most recent CFCA fraud loss survey, International Revenue Share Fraud has once again emerged as one of the top 5 global fraud loss types. However, compared to the results in 2011, International Revenue Share Fraud (IRSF) has now claimed the top spot and is also the primary emerging fraud threat globally, highlighting the undeniable reality that the threat of IRSF and Wangiri cannot be ignored.

 

Fraud Losses CFCA2013Source: CFCA Global Fraud Loss Survey 2013.

While the total communications fraud loss is estimated to be $46.3 billion annually – a 15% increase from 2011, IRSF fraud loss is estimated to be $1.8 billion.

So what should operators do to combat IRSF fraud? Bolstering the Fraud Management System with additional rules is perhaps the strategy that most operators would consider. But with what remains the question? Additional rules, thresholds and disallowing calls to and from high risk destinations may not help because there are over 220 countries from which IRSF can originate.

In most IRSF incidents, fraudsters will first call a Test Number to confirm that the destination country and number range can be reached from their calling location and from the device they are using to originate the calls. This modus operandi has led us to create a real time database of Test Numbers that are frequently advertised by IPRN providers in order to attact potential rogue players to drive traffic to such premium rate numbers.

Our Rombus IRSF databases have a collection of over a million IPRN numbers that are updated in real time which can be used as a hot list in your existing fraud management system. A hotlist alert from an IRSF number called will initiate an investigation and identify a pending IRSF attack, or provide confirmation that one has started.

Rombus IRSF Database – Learn more >

You Might Also Like
Battle tested technology.
Use it just the way you want it.

Whether you are just starting out or you are miles ahead and want to optimise your customer experience, you can use our technology just the way you imagine it. In multiple ways for multiple use cases.

Native Mobile SDKs

Offline Android and iOS components for identity capture. Works without internet connection. Quick integration into your native Apps. Tested in over 1000+ mobile devices.

View SDK Documentation video kyc
Cloud APIs

Restful APIs that can be integrated instantly without worrying about infrastructure or auto scaling. Our battle tested AWS environment is ISO 27001:2013 certified and monitored 24x7.

View API Documentation video kyc
On-Premise

Use our technology deployed as Docker containers in your own servers. In this set up there are no external calls outside your servers giving you total control over your data.

Contact Sales video kyc
Cloud Dashboard (no-code)

Get started instantly and begin your identity verification projects. The dashboard provides you with everything you need to onboard your customers as per prevailing regulations.

Book a demo video kyc

Trusted technology platform.

Trust is hard to earn. We certainly do not earn them through paid advertising. Instead, we earn your trust by providing a high-quality product and reliable service that you can count on. Every single day.

Patented technology
Patented technologies matured over 14 years with proven accuracy, quality and scale.
Support that truly supports
Whatever it takes, we are here to help you succeed with our tools and services.
Secure enterprise platform
Use our cloud platform to get started now. Or deploy this within your own premises.
Pricing that makes sense
Pay per transaction with discounts as you scale. Or annual subscription with unlimited usage.

Trusted by 200+ customers worldwide

Book a free demo

Built for flexibility, compliance and reliability to serve multiple industry segments.

Banks
Insurance
Telco
Ecommerce
Fintech
Healthcare
Delivery
Gig Economy
Governments