CALL ME: GATHERING THREAT INTELLIGENCE ON TELEPHONY SCAMS TO DETECT FRAUD. Aude Marzuoli, Ph.D. Pindrop



Similar documents
PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY

PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY

Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment

Welcome to Leads Plus. Alternative Script Training

David Offen - Bankruptcy Expert

Tenable for Google Cloud Platform

Courtesy of D W A R D M A R K E T I N G. david@dwardmarketing.com (413)

The Big Data Paradigm Shift. Insight Through Automation

FEDERAL ELECTRONIC FUND TRANSFER DISCLOSURES

You Must Ask Your Internet Marketing Consultant to Multiply Results

TESTIMONY OF HENNING SCHULZRINNE Levi Professor of Computer Science and Electrical Engineering Columbia University SENATE AGING COMMITTEE

Please note the information contained within this document is for Educational purposes only.

POLIWALL: AHEAD OF THE FIREWALL

15 Bad Things Identity Thieves Can Do With Your Identity

Multi-dimensional Bid Management

Analytics, Big Data, & Threat Intelligence: How Security is Transforming

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

POLIWALL: AHEAD OF THE FIREWALL

Best practices for improving consumer data quality

Evaluating DMARC Effectiveness for the Financial Services Industry

2016 Firewall Management Trends Report

Personal Information. About you. Personal information and your identity.

Review VIDEO WORKSHEET. Your Digital Identity A Permanent Step # Name: Hour:

Could you spot a scammer?

Click Here -> LegitPaidOnlineSurveys.com - Getting Paid for Online Surveys! > Click Now <

Copyrights PPC Bully (MyAdWise Ltd.) - Page 1 of 13

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud

Scamproof your savings

news Membership statistics update Under One Roof is the service for letting affordable rented homes in St Helens. In this issue...

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

How to obtain tax return transcripts from the IRS website

NATIONAL COST OF VoIP BYPASS

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Set Top Box User Guide. Global Reach with a Local Touch

Criminal Investigation

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)

Advertise With BizPin 365

Data Science and Prediction*

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Threat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence

Market Research Methodology

Protecting Yourself from Identity Theft

Protecting Families, Finances, and Your Future. Mortgage. Debt. Taxes. Budgets

Digital Citizenship Lesson Plan

How To Track Your Ads On Bing On A Pc Or Pcf On A Microsoft Macbook V2.2.5 (For Pc) On A Macbook Or Bing Ppl On A Web Browser On A Blackberry Or Ip

Frequently Asked Questions Wellmark s Identity Protection Services Offering Member Q&A

Digital Marketing Services Product Overview

BENEFITS OF ADWORDS. Take advantage of searches. Allows potential clients to find you on Google. Only pay when someone clicks on the ad

Are you enrolled in estatements yet? If you are, you're already entered to win one of fifty: $50 Visa gift cards!

one Managing your PBX Administrator ACCESSING YOUR PBX ACCOUNT CHECKING ACCOUNT ACTIVITY

GEOMETRIC SEQUENCES AND SERIES

Information Leakage in Encrypted Network Traffic

Office 365 Adoption & Risk Report

Advance Fee Loans. Computer Malware Scams. Credit Repair Scams

Configuring the Synapse SB67070 SIP Gateway from AT&T for Clearfly SIP Trunking. January 2013

Credit Card Acceptance & Chargeback Prevention

RoboKiller Protection from robocalls once and for all!

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

White Paper - Travel & Entertainment Spend Analytics Best Practices

At The Crossroads of Marketing and Technology. Top 6 Tips for Success in the Digital World

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

How does the EMV Travel Prepaid Card work?

Understanding. What you need to know about the most widely used credit scores

Repsheet. A Behavior Based Approach to Web Application Security. Aaron Bedra Application Security Lead Braintree Payments. tirsdag den 1.

The Five Biggest MISSED Internet Marketing Opportunities Most Lawyers Don't Know About

REPORT CARD. How to Tell if Your Agency Knows the Difference. Between Local SEO and Traditional SEO. Your Local SEO

Deception scams drive increase in financial fraud

How To Make Money Online Without Having A Website Or Blog Post Written

Bankrupt Your Student Loans and Other Discharge Strategies

Chapter 4 Getting Started with Business Intelligence

It Is In Your Interest

If you have kept your shares at the default service provider, Morgan Stanley, please refer to this document for service feature details.

Benefits Open Enrollment Frequently Asked Questions

Transcription:

CALL ME: GATHERING THREAT INTELLIGENCE ON TELEPHONY SCAMS TO DETECT FRAUD Aude Marzuoli, Ph.D. Pindrop

Pioneer in voice fraud prevenfon and authenfcafon helping companies eliminate phone fraud. Patented PhoneprinFng technology can idenffy, locate and authenfcate phone devices uniquely just from the call audio. Selected by the world s largest banks, insurers, brokerages and retailers, detecfng over 80% of fraud, even for avackers never seen before. Pindrop was founded in 2011 and to date has raised $122 million.

Outline IntroducFon to our Honeypot, a.k.a. Phoneypot Tracking spam/scam campaigns Gathering Intelligence on Telephony abuse Conclusion

Introduc.on to Phoneypot

Who s REALLY calling you? Human Element IVR Blind Spot Caller ID PII & KBA

But now scammers are calling you direct DATA Customer Names Financial InsFtuFons, Account Numbers, SSN, Account balance, PIN, Password, DOB

Why research telephony fraud? Understand the telephony fraud/scam ecosystem Gather threat intelligence through measurements and experiments Design defense strategies and deploy them

TELEPHONY HONEYPOT Phoneypot IN ONE MONTH 550,000 CALLS 90,000 SOURCE PHONE NUMBERS LIMITATIONS Source phone numbers spoofing Most phone numbers call once or twice Labels Needed 40,000 DESTINATION PHONE NUMBERS During the first half of 2016, we recorded 100,000 calls to our Honeypot.

PHONEYPOT VS ONLINE COMMENTS Data set # of calls # of source phone numbers Phoneypot 8,000,000 880,000 21,329 Online Comments 660,000 74,000 2,156 Data set collected for year 2015. Max. # of calls or comments per source phone number 66% of online comments are complaining about only 2% of sources in the Phoneypot.

Tracking spam/scam campaigns

System Overview Past calls Call Details Audio Recordings Machine Learning Engine using audio transcripfon and audio features Library of known Robocallers New Call Audio Features ExtracFon

Keywords are too noisy Transcript to compare: press one to say fiby per cent on your electric bill with no money out of pocket using in new jersey sober company with hundreds of sahsfied customers pressed to and conhnue paying one of the highest electric uhlity rates 93% similarity to: oh press one to say fiby percent on your electric bill with no money out of pocket to using a new jersey's older company with hundreds of sahsfied customers pressed to in conhnue paying one of the highest electric uhlity rates 63% similarity to: hi we're just doing the quick survey where you where the new jersey residence or now enftled to the rebate on their electric bills twice a year and a twenty five dollar visa gii card press one 39% similarity to: do you have at least ten thousand dollars in credit card debt and medical bills would you like to hear about of program that can reduce your bounds or than effecfvely eliminate your interest

Clustering of transcripts similarity matrix Raw similarity matrix between all pairs of transcripts Dark dot if transcript i is similar to transcript j Spectral clustering Results

Cluster extrac.on Healthcare RegulaFon for Seniors IRS and taxes Back brace shown on TV commercial Alice calling about business loan Free cruise to the Bahamas Sherrie online specialist for Google, Yahoo, Bing Google business lisfng records Do you need a burial policy? Are you trapped in student loans? Home security system

Cluster Phoneprin.ng Source phone numbers whose calls correspond to idenfcal audio recordings Extract 150 audio features for all calls in the same cluster Phoneypot desfnafon phone numbers

Phoneprin.ng 150 factors analyzed on every call Call Type IniFal call Geo- LocaFon Unique Phone Spectrum Quantization, Frequency filters, Codec artifacts Noise Clarity, Correlation, Signal-to-noise ratio Loss Packet loss, Robotization, Dropped frames

Phoneprin.ng dis.nct bad actors Feed the classifier: PosiFve class: audio features from all calls in the same cluster NegaFve class: audio features from any other call Tested across more than 50 clusters: Average performance: 85.5% True PosiFve Rate at 0.25% False PosiFve Rate Good performance even with <2 calls for each source phone number. Good phoneprint performance on a cluster implies that all calls from this cluster come from the same physical telephony infrastructure.

Gathering Intelligence on Telephony abuse

Google- related scams One of the most complex scams More than 10 different recordings targefng Google users, from Google maps to Google plus. Asking you to pay money for front page placement on Google search results. Asking you to verify personal informafon. * two of our backers are Google capital and GV

Sharon, your Google specialist Hi this is Sharon your local Google specialist. We have a front page posifon available for a business like yours and can guarantee front page placement with unlimited clicks 24 hours a day at a flat rate on Google. Press one key right now to see if you qualify and are interested in receiving calls from companies who are locally searching for your type of business. Please press one now or press the two key to be removed. Thank you. 253 Source phone numbers 27,928 calls from January to July 2016 17,160 desfnafon phone numbers from Phoneypot Phoneprint performance: 93.4% TPR at 0.4% FPR

Google Business lis.ng This is an important call regarding your google business lisfng. We need to verify your contact informafon. Press one now to verify your google business lisfng. Press seven to remove yourself from the verificafon system. Phoneprint performance: 92.7% TPR at 0.2% FPR 410 Source phone numbers 34,048 calls from January to July 2016 26,841 desfnafon phone numbers from Phoneypot

Debt Collectors This call is from XXXX outsourcing, a debt collector. Please return my call at 866- XXX- XXXX. Targeted harassment tacfcs 7 Source phone numbers 1,301 calls from January to July 2016 92 desfnafon phone numbers from Phoneypot

Experiment Overview 1 Million calls, from 210k sources 100k recordings, from 44k sources 31k robocalls 51% of robocalls from 38 infrastructures

CONCLUSION

Conclusion We recorded 100,000 calls over several months in 2016. Using machine learning on call paverns, semanfcs and audio features, we can uniquely idenffy one bad actor hiding behind several source phone numbers, whether these numbers are legifmate or spoofed. Our results show that 51% of the robocalls recorded are placed by 38 disfnct telephony infrastructures which can be uniquely idenffied with more than 85% TPR on average.

Acknowledgements & Ques.ons Data Science team at Pindrop: Hassan Kingravi, David Dewey, Aaron Dallas, Telvis Calhoun, Terry Nelms