Use case #0001

How Fraud AI Detects SIM-Swap Fraud at the Onboarding Stage

A SIM swap takes 4 minutes to execute at a telecom service centre. In those 4 minutes, a fraudster gains control of a phone number they do not own — the number linked to the victim's Aadhaar, bank account, and OTP delivery channel. By the time the victim realises their phone has no service, a loan application may already be in the system using their identity. The Fraud Risk AI detects the swap before the OTP is sent.

A SIM swap takes 4 minutes to execute at a telecom service centre. In those 4 minutes, a fraudster gains control of a phone number they do not own — the number linked to the victim's Aadhaar, bank account, and OTP delivery channel. By the time the victim realises their phone has no service, a loan application may already be in the system using their identity. The Fraud Risk AI detects the swap before the OTP is sent.

How SIM-Swap Fraud Works in Indian Lending

The mechanics are well-documented and depressingly simple. A fraudster obtains a victim's PAN, Aadhaar number, and mobile number — available through data breaches, social engineering, or dark web purchase. They visit a telecom outlet with fraudulent identity documents and request a SIM replacement or number portability on the victim's number. Once the swap is processed, all OTPs and authentication messages intended for the victim are delivered to the fraudster's new SIM.

The fraudster then initiates a loan application at one or more digital lenders using the victim's identity. Aadhaar OTP-based verification — the cornerstone of digital KYC in India — is effectively compromised: the OTP goes to the fraudster, who completes the verification, and the application proceeds through the pipeline as if it were a legitimate borrower. By the time the loan is disbursed, the fraudster has transferred the funds and vanished, leaving the victim to dispute a loan they never took.

The window between SIM swap and loan disbursement is typically 2 to 8 hours for fast-disbursing digital lenders. The Fraud Risk AI collapses this window to zero by detecting the swap at the moment of application, before any OTP is sent.

"A SIM swap is not a cybersecurity incident — it is a social engineering attack on the telecom layer that bypasses every digital authentication measure the institution has. The Fraud AI looks at the layer below authentication."

The 8 SIM-Swap Signals the AI Monitors

Signal Data Source SIM-Swap Indicator False Positive Risk Weight
SIM issue date vs application date Telecom API (TRAI-mandated) SIM issued within 72 hours of application — primary indicator Low — legitimate users rarely apply immediately after SIM change Critical
Number portability event MNPAS / Telecom API Port-in completed within 7 days of application Low — legitimate port-in users typically have weeks of history on new network Critical
Device fingerprint change App SDK / Browser fingerprint Mobile number previously accessed from Device A; current session from new Device B Medium — device upgrades are common; requires combination with other signals High
Location mismatch IP geolocation / GPS (if consented) Application from city/state inconsistent with registered address and prior account activity Medium — travel creates legitimate mismatches; weighted by distance magnitude High
Velocity of bureau enquiries CIBIL / Experian API 3+ enquiries in 48 hours from different lenders on same PAN Low — spam-apply behaviour is a fraud marker regardless of SIM swap High
Aadhaar OTP timing anomaly UIDAI OTP logs (internal) OTP completed in under 8 seconds — fraudsters pre-stage the process Medium — fast typists exist; requires combination signal Medium
Bank account activity gap Bank statement analytics No transactions on linked bank account in 30+ days prior to application High — dormant accounts are common; use as corroboration only Supporting
Application time of day Application timestamp Application submitted between 2 AM and 5 AM — fraudster operating window Medium — shift workers apply at unusual hours; weighted by geography Supporting

The SIM-Swap Detection Timeline

Day −180
Legitimate
Baseline — Normal Account Activity

Customer's Mobile Number Has 6+ Months of Normal History

Mobile number registered to customer for 3 years. App logins from consistent device (Samsung Galaxy, Mumbai IP range). Bank transactions weekly. Bureau enquiry 6 months ago for personal loan. Fraud AI baseline established — all signals within normal parameters.

Day 0
04:12 AM
SIM Swap Executed

Fraudster Completes SIM Swap at Telecom Service Centre

SIM swap completed on victim's number. Telecom records show new SIM issued at 11:47 PM the prior evening — unusual time for a service centre transaction. Network shows 4 hours of "no service" before the number came live on new SIM. Fraud AI receives SIM age data from telecom API when application is initiated.

Day 0
04:18 AM
Fraud AI Detection — Application Flagged

Loan Application Submitted — 3 Critical Signals Converge

Application received: ₹4.8L personal loan. Fraud AI checks in parallel: (1) SIM issued 4.5 hours ago — Critical signal. (2) Application from Ahmedabad IP; registered address Mumbai — High signal. (3) 2 bureau enquiries in last 6 hours from other lenders — High signal. Combined fraud score: 94/100. Application auto-held. OTP suppressed. Fraud investigation team alerted within 90 seconds.

Day 0
04:20 AM
Fraud AI Action — Investigation Triggered

Application Held Pending Manual Verification

Application placed in fraud review queue. Borrower (the victim) has not yet been notified by their telecom of the SIM swap — they are asleep, their phone showing no service. Fraud investigation team initiates: callback attempt to the original network number (fails — number now on new SIM); verification of address via secondary check. Application never disbursed. Victim contacted at 9 AM via email registered on account.

The Balance: Fraud Detection Without False Positives

The most expensive fraud detection model is not one that misses fraud — it is one that creates false positives. A legitimate borrower who travels for work and purchases a new SIM card because their old phone broke should not find their loan application blocked and their identity suspended. The Fraud Risk AI uses a tiered response architecture rather than a binary block-or-pass system.

A single moderate signal — new SIM with no other corroborating indicators — routes the application to a step-up verification: the borrower is asked to complete a secondary authentication via their registered email address and confirm their PAN and registered address verbally during V-KYC. This adds 5 minutes to their journey while generating corroborating evidence that is either reassuring (confirmed identity match) or further damning (cannot confirm details). Only the combination of multiple high-weight signals, or a single Critical signal, results in an application hold for investigation.

4.5hrsAverage SIM swap to fraud application attempt window — AI detects in first minute
8SIM-swap specific signals checked before any OTP is dispatched
90secTime from application receipt to fraud investigation alert for confirmed cases
0OTPs sent on applications with Critical-level SIM-swap signal — suppressed pre-authentication

The OTP Is Not the Authentication — It Is the Target

The entire architecture of OTP-based authentication assumes that the phone number is controlled by the person who owns it. SIM swap attacks invalidate that assumption. The Fraud Risk AI checks the validity of the phone-to-person link before the OTP is sent — not after it is verified. Catching a SIM swap after OTP completion is damage limitation. Catching it before OTP dispatch is fraud prevention.

← Back to Fraud Risk Agent AI