Access your online account from any web browser.
Two-way SMS functionality that integrates with multiple platforms.
Manage your SMS communications from your desktop.
Send bulk SMS text messages using our iOS mobile app.
Receive incoming messages directly from your customers.
Get your own 5 digit shortcode.
Find out more about the SMS solutions we offer here.
Integrate using our API and send SMSes automatically.
Take a read through our APIs and see what suits you.
Featuring our infographics, how to’s and industry specific use cases.
A useful resource for those with questions. FAQ’s and video tutorials.
A look into how our customers are innovating with our products.
Practice safe sending. Check out the regional regulations for your country.
Highlighting the current trends and hottest news in the messaging industry.
A complete guide to our Privacy Policy and Terms and Conditions of Service.
Log into your BulkSMS.com online account here.
Log into the BulkSMS Integration Gateway here.
By BulkSMS.com. Uploaded on: 04 July 2023.
As the name suggests, AIT involves the generation of fake traffic through apps or websites, specifically targeting those who make use of application-to-person SMS messaging services to send One-time Passwords (OTP). OTPs are often used as a security or verification step as part of an authentication method for online account access.
In an AIT attack, fraudsters use bots to create fake accounts on multiple platforms or apps. These bots then trigger the sending of OTP SMSes, which results in a surge in SMS traffic to specific destinations. However, the primary objective is not to deliver messages to the mobile numbers but rather to inflate the traffic artificially on a mobile network.
Unlike many other types of fraud, AIT attacks require the involvement of multiple parties. Here’s a simple breakdown of who is involved in an AIT attack and how each party benefits:
The mastermind behind the AIT attack is the fraudster. The fraudster designs and deploys the bot responsible for creating fake accounts with fake mobile numbers on an expensive network route and triggers OTP SMS messages in the process. The fraudster orchestrates the entire operation, exploiting vulnerabilities in mobile networks for profit.
The bot, developed and deployed by the fraudster, carries out the automated tasks required to initiate the AIT attack. This software is programmed to create fake accounts across multiple platforms or applications, mimicking human behavior as closely as possible. Once the accounts are set up, the bot triggers OTP SMS messages to fake mobile numbers, thus generating the desired surge in traffic.
To intercept the artificially inflated traffic and benefit financially from the AIT attack, the fraudster collaborates with a rogue party. This rogue party operates within the telecommunications industry. They intercept the SMS traffic before it gets to the networks and before attempts to deliver the messages to the fake recipients. They collect the OTPs and use them on the target websites as they would be used by normal users. By doing so, they avoid detection while claiming a share of the revenue generated from the inflated traffic. The fraudster and the rogue party share the profits obtained from the AIT attack.
At BulkSMS.com, our 800+ carrier connections, and our industry compliance help you limit fraud and protect your clients. If you have any questions on how to better protect your account, or would like to know more about AIT, please contact support@bulksms.com.