Executive AI Dinner hosted by Kumo - Austin, April 8

Register here
4Binary Classification · SIM Fraud

SIM Fraud Detection

Which SIM cards are being used for fraud?

Book a demo and get a free trial of the full platform: research agent, fine-tune capabilities, and forward-deployed engineer support.

By submitting, you accept the Terms and Privacy Policy.

Loved by data scientists, ML engineers & CXOs at

Catalina Logo

A real-world example

Which SIM cards are being used for fraud?

Telecom fraud costs carriers $39B globally per year. SIM-based fraud schemes (SIM swaps, SIM boxes, IRSF) are increasingly sophisticated and operate through coordinated rings. A mid-size carrier loses $35M annually to fraud, and traditional rule-based systems catch only 40% of cases, with 30% false-positive rates that overwhelm fraud teams. The fraud signal is in the network: burner SIMs activated in batches, calling patterns to premium numbers, and device-change sequences that match known fraud playbooks.

Quick answer

SIM fraud detection requires graph-based models that connect SIMs through shared IMEIs, co-activation locations, and coordinated calling patterns to expose fraud rings. Per-SIM rule engines catch only 40% of fraud with 30% false-positive rates. Graph ML catches 85% of fraud rings with a 5% false-positive rate by analyzing the network structure: a single suspicious SIM connects to 50 others through shared activation patterns.

Approaches compared

4 ways to solve this problem

1. Rules-based velocity checks

Flag SIMs that exceed thresholds: too many activations per device, calls to known premium numbers, or SIM swaps within 48 hours.

Best for

Fast to deploy and catches the most blatant fraud patterns. Good for known fraud playbooks with clear signatures.

Watch out for

Rules are static and fraud evolves. Catches only 40% of fraud with 30% false-positive rates. Cannot detect coordinated ring behavior where each individual SIM's activity looks normal.

2. Anomaly detection on per-SIM features

Build behavioral profiles per SIM and flag statistical outliers using isolation forests or autoencoders on usage patterns.

Best for

Catches novel fraud patterns that do not match known rules. Good complement to rule-based systems.

Watch out for

Evaluates each SIM independently. A fraud ring distributes activity across 50 SIMs so that no single SIM looks anomalous. The fraud is in the coordination, not the individual behavior.

3. Network analysis (community detection)

Build a graph of SIM relationships (shared IMEIs, co-activation, common call destinations) and identify suspicious communities.

Best for

Reveals ring structure that per-SIM approaches miss entirely. Good for investigation and visualization of fraud networks.

Watch out for

Static graph analysis produces snapshot results. Misses the temporal dimension: the sequence of activations, device swaps, and calls matters as much as the connections themselves.

4. KumoRFM (relational graph ML)

Connect SIMs, subscribers, calls, data sessions, and device changes into a temporal fraud graph. The GNN learns coordinated activation patterns, shared IMEI networks, and calling behavior signatures across the full ring structure.

Best for

Highest detection rate with lowest false positives. Catches 85% of fraud rings at 5% false-positive rates by learning temporal, multi-hop ring patterns.

Watch out for

Requires device-level data (IMEI tracking) and call detail records. If only billing-level data is available, detection will be less precise.

Key metric: SAP SALT benchmark: relational graph ML achieves 91% accuracy vs 63% for rules-based and 75% for XGBoost on flat tables in fraud detection tasks.

Why relational data changes the answer

SIM fraud is a network crime, not an individual crime. A SIM box operation involves 50+ SIMs activated in batches, sharing IMEI devices in rotation, and making coordinated calls to the same premium international numbers. Each individual SIM's behavior might look borderline normal: a few calls, minimal data usage, one device swap. The fraud only becomes obvious when you connect the SIMs through their shared devices, activation timestamps, and calling destinations.

Relational models build this fraud network automatically from raw CDR and activation data. They learn patterns like 'five SIMs activated at the same store within 48 hours, sharing two IMEI devices, all calling the same +882 number prefix.' A per-SIM rule engine evaluates each of those five SIMs independently and may flag zero of them. The graph model sees the connected structure and flags all five with 92%+ confidence. SAP SALT benchmark shows relational graph ML achieves 91% accuracy vs 63% for rules-based approaches on fraud detection tasks.

Detecting SIM fraud one SIM at a time is like investigating organized crime by analyzing each suspect's bank statement separately. Each individual account looks clean. The crime only becomes visible when you trace the money flowing between accounts, the shared shell companies, and the coordinated timing of transfers. Fraud ring detection requires the network view.

How KumoRFM solves this

Graph-learned network intelligence across your entire subscriber base

Kumo builds a fraud network graph connecting SIMs, subscribers, call/data sessions, and device changes. It learns that SIMs activated within 48 hours of each other, sharing IMEI devices, and generating calls to the same set of international premium numbers form fraud rings. The graph structure reveals that a single suspicious SIM is connected to 50 others through shared activation locations and calling patterns. Traditional models evaluate each SIM independently and miss these ring-level signals entirely.

From data to predictions

See the full pipeline in action

Connect your tables, write a PQL query, and get predictions with built-in explainability — all in minutes, not months.

1

Your data

The relational tables Kumo learns from

SUBSCRIBERS

subscriber_idactivation_datechannelid_verified
SUB3012025-02-28OnlineY
SUB3022025-02-28OnlineN
SUB3032025-01-15RetailY

SIMS

sim_idsubscriber_idimeiactivation_storestatus
SIM001SUB301IMEI_A001Store_22Active
SIM002SUB302IMEI_A001Store_22Active
SIM003SUB303IMEI_B445Store_08Active

CALLS

call_idsim_iddestinationduration_sectimestamp
CL01SIM001+882-12345671802025-03-01
CL02SIM002+882-12345671752025-03-01
CL03SIM003+1-555-01993202025-03-01

DATA_SESSIONS

session_idsim_iddata_mbtimestamptower_id
DS01SIM0012.12025-03-01TWR_445
DS02SIM0021.82025-03-01TWR_445
DS03SIM0038502025-03-01TWR_102

DEVICE_CHANGES

change_idsim_idold_imeinew_imeitimestamp
DC01SIM001IMEI_A001IMEI_A0022025-03-02
DC02SIM002IMEI_A001IMEI_A0032025-03-02
2

Write your PQL query

Describe what to predict in 2–3 lines — Kumo handles the rest

PQL
PREDICT BOOL(SIMS.FRAUD_FLAG, 0, 7, days)
FOR EACH SIMS.SIM_ID
WHERE SIMS.STATUS = 'Active'
3

Prediction output

Every entity gets a score, updated continuously

SIM_IDSUBSCRIBER_IDACTIVATION_AGEFRAUD_PROB
SIM001SUB3013 days0.92
SIM002SUB3023 days0.94
SIM003SUB30346 days0.03
4

Understand why

Every prediction includes feature attributions — no black boxes

SIM SIM001 -- 3-day activation, shared IMEI

Predicted: 92% fraud probability

Top contributing features

Shared IMEI with other SIMs

2 SIMs on same device

31% attribution

Calls to premium international numbers

12 calls to +882

26% attribution

Co-activation pattern

Batch of 5 SIMs

19% attribution

Data usage anomaly

< 5MB/day (SIM box pattern)

14% attribution

Device change velocity

2 swaps in 48h

10% attribution

Feature attributions are computed automatically for every prediction. No separate tooling required. Learn more about Kumo explainability

Frequently asked questions

Common questions about sim fraud detection

How do you detect SIM swap fraud?

Connect SIM activations, device IMEI changes, and call patterns in a graph model. SIM swap fraud shows specific graph signatures: rapid IMEI changes, calls to account service numbers followed by high-value transactions, and device sharing with other suspicious SIMs. Graph ML detects these coordinated patterns in real time rather than after the victim reports unauthorized activity.

What is a SIM box and how do you detect it?

A SIM box routes international calls through local SIMs to avoid interconnect fees. Detection signals include: multiple SIMs sharing IMEI devices, minimal data usage (voice-only traffic), calls concentrated to international premium numbers, and batch activation patterns. Graph ML connects these SIMs through their shared infrastructure and flags the entire operation.

How much does SIM fraud cost telecom carriers?

Telecom fraud costs carriers $39B globally per year. A mid-size carrier loses $35M annually to SIM-based fraud including SIM swaps, SIM boxes, and IRSF (International Revenue Share Fraud). Traditional rule-based systems catch only 40% of cases with 30% false-positive rates that overwhelm fraud investigation teams.

Why do rules-based systems fail for telecom fraud?

Fraud rings distribute activity across dozens of SIMs so that no individual SIM triggers rules. Each SIM makes a few calls, uses one device, and looks normal in isolation. The fraud is in the coordination: shared devices, batch activations, and synchronized calling. Rules engines evaluate SIMs independently and miss the ring structure entirely.

What data is needed for SIM fraud detection?

Critical data: SIM activation records, IMEI/device tracking, call detail records (CDRs), and subscriber identity verification status. High-value additions: tower-level location data, data session records, and device-change logs. The IMEI tracking and activation records are the most important for revealing ring structure through shared devices and coordinated timing.

Bottom line: A carrier losing $35M annually to SIM fraud that deploys Kumo's graph-based detection catches 85% of fraud rings with a 5% false-positive rate, recovering $25M+ per year. Kumo reveals the ring structure through shared IMEIs, co-activation patterns, and coordinated calling behavior that per-SIM rule engines cannot see.

Topics covered

SIM fraud detectiontelecom fraud AISIM swap detectionsubscription fraud MLIRSF detectiongraph neural network fraudKumoRFM telecom fraudfraud ring detectionSIM box detection AI

One Platform. One Model. Infinite Predictions.

KumoRFM

Relational Foundation Model

Turn structured relational data into predictions in seconds. KumoRFM delivers zero-shot predictions that rival months of traditional data science. No training, feature engineering, or infrastructure required. Just connect your data and start predicting.

For critical use cases, fine-tune KumoRFM on your data using the Kumo platform and Research Agent for 30%+ higher accuracy than traditional models.

Book a demo and get a free trial of the full platform: research agent, fine-tune capabilities, and forward-deployed engineer support.