Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Lifecycle of a Phone Fraudster - Exposing Fraud Activity

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricate world of phone fraud in this Black Hat conference talk. Delve into the lifecycle of phone fraudsters and learn how to detect account takeover attempts through acoustical anomalies and graph analysis. Discover techniques to identify reconnaissance calls days before actual account takeovers occur. Examine a dataset of hundreds of millions of calls to understand the methods used by fraudsters to socially engineer call center agents and exploit system vulnerabilities. Gain insights into the effectiveness of using acoustical anomalies for fraud detection, achieving over 80% accuracy with less than 2% false positives. Investigate the application of graph analysis in identifying reconnaissance calls preceding account takeovers. Uncover the various stages of phone fraud, including IVR manipulation, call center exploitation, and voice distortion techniques. Learn about the distribution of fraudsters, creation of fraudster profiles, and the importance of reputation and velocity in fraud detection. Analyze real-world examples, including IRS scams and electrical grid interference. Understand key takeaways such as time gaps between fraud stages, changing attack vectors, and the prevalence of this technology in the industry.

Syllabus

Introduction
Overview
Call Center Fraud
IVR
Call Center
Reveal
Mode of Operation
Analysis
Voice over IP
Shortterm energy
Packetization
IRS Scam
Electrical Grid Interference
Acoustical Anomalies
Distribution of Fraudsters
Anomalies
Separating Good and Bad Calls
Creating Fraudster Profiles
Plotting Fraudster Profiles
Voice Distortion
Red Pockets
CDR Data
Reputation Velocity Behavior
Reputation Example
Velocity Example
Reconnaissance Example
Overall Result
Example
Key takeaways
Time gap between fraud stages
False positive rate
Changing vectors of attack
How common is this technology

Taught by

Black Hat

Reviews

Start your review of Lifecycle of a Phone Fraudster - Exposing Fraud Activity

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.