ClickCease

The Silent Drain: How SMS Pumping Is Bleeding Digital Marketplaces Dry

SMS Pumping: The Silent Threat Draining Digital Marketplaces
Identity & Fraud · Technical Deep Dive

The Silent Drain:
How SMS Pumping Is Bleeding Digital Marketplaces Dry

Artificial inflation of SMS traffic is no longer a fringe nuisance. It's a sophisticated, large-scale fraud vector — one that is systematically breaking OTP-based verification and costing platforms millions per year.

Prove Identity Platform · 15 min read · Fraud & Risk Engineering

Every time a digital marketplace sends a one-time passcode to verify a user's phone number, it's writing a check. Most of the time, that check goes to a legitimate user. But an increasingly sophisticated ecosystem of fraudsters has found a way to intercept that payment — without ever touching the user.

This is SMS pumping fraud. Also known as Artificially Inflated Traffic (AIT) or SMS toll fraud, it represents one of the most financially damaging and technically underappreciated threats facing identity and risk teams at consumer-facing platforms today.

Unlike traditional account takeover or credential stuffing attacks, SMS pumping doesn't require stolen credentials, social engineering, or any user interaction at all. Its victims — the platforms — often don't discover the attack until the telecom invoice arrives.


What Is SMS Pumping — and How Does It Work?

At its core, SMS pumping is a revenue-sharing scam that exploits the economics of the global SMS routing ecosystem. To understand it, you need to understand how SMS traffic and interconnection fees actually work.

When a platform sends an SMS — say, a one-time passcode to a phone number — that message doesn't travel directly from the platform's servers to the user's handset. It passes through a chain of intermediaries: the platform's SMS aggregator, international carriers, regional operators, and finally a terminating carrier that delivers the message to the end device. At each handoff, fees are negotiated and collected.

In many countries, particularly in Africa, Southeast Asia, Eastern Europe, and parts of Latin America, terminating carriers are permitted to set their own interconnect rates — the fees charged to route traffic to their numbers. And here's the vulnerability: the platform pays these fees regardless of whether a human ever reads the message.

Fraudsters exploit this by acquiring or colluding with small mobile operators (known as "premium range" or "grey route" operators) that control number ranges with elevated interconnect fees. They then systematically flood those number ranges with requests for SMS verification codes — triggering mass OTP sends — and collect a revenue share from the inflated traffic.

Key mechanism

The fraudster controls the number range. The platform pays per SMS sent. The fraudster collects a cut of every message that arrives. No one needs to "receive" anything — the money flows the moment the message is sent.

The Infrastructure Behind an Attack

Modern SMS pumping operations are not one-person schemes. They involve layered infrastructure that spans multiple jurisdictions and technical layers:

Bot networks and automation frameworks programmatically trigger registration or login flows on target platforms, submitting fabricated or harvested phone numbers that map to attacker-controlled ranges. These bots mimic realistic user behavior: varying request cadence, rotating IP addresses through residential proxies, and cycling device fingerprints.

Phone number range acquisition is handled through a combination of legitimate MVNO registrations (which in some jurisdictions require minimal documentation) and partnerships with complicit terminating carriers. The fraudster needs only to control numbers in a range — not individual SIM cards.

Revenue distribution flows through opaque revenue-sharing agreements between the fraudster and the carrier. In many cases, the carrier itself may not be actively complicit — it's simply an unwitting beneficiary of inflated interconnect revenue from upstream resellers.


The Scale of the Problem

$1B+ Annual losses attributed to AIT/SMS pumping globally
15–20% Of all SMS OTP traffic estimated to be fraudulent on unprotected platforms
190+ Countries where SMS pumping routes have been documented

These numbers are difficult to pin down with precision — because SMS pumping is, by design, hard to detect. Platforms often mistake inflated SMS send volumes for organic growth signals. Fraud teams focused on account takeover or payment fraud are rarely calibrated to spot this kind of infrastructure-layer attack.

What's clear from the platforms that have investigated and disclosed attacks is that the damage accumulates fast. High-volume marketplaces with millions of registered users — the very platforms with the most active SMS-based verification flows — are the most lucrative targets. A platform sending 10 million OTPs per month and experiencing 15% fraudulent traffic is paying for 1.5 million phantom messages, often at international premium rates that can reach $0.08–$0.15 per message. That's $120,000–$225,000 per month, silently vanishing.

"The fraud doesn't show up in your fraud metrics. It shows up in your cloud bill — or more precisely, your SMS aggregator invoice."

The telecommunications industry body GSMA has formally designated SMS pumping as a category of "Artificial Inflation of Traffic" (AIT) and has issued guidance to carriers. But the financial incentives for complicit operators are significant, and the enforcement landscape is fragmented across jurisdictions.


Why Digital Marketplaces Are Prime Targets

Not all platforms are equally exposed. Digital marketplaces — platforms like Uber, DoorDash, Instacart, Care.com, TaskRabbit, Thumbtack, and their international equivalents — are disproportionately vulnerable for structural reasons rooted in how they handle identity and trust.

High-Volume, Low-Friction Registration

Marketplace growth is measured in supply and demand — drivers, gig workers, caregivers, contractors on one side; riders, customers, and families on the other. To optimize funnel conversion, most marketplaces have deliberately minimized friction at registration. SMS OTP is positioned as the lightweight identity signal that unlocks access: send a code, confirm the number, done.

This creates a structural attack surface: any automated system that can submit phone numbers and complete the OTP loop can generate verified accounts — or simply drain SMS budget — at scale.

The Trust Signal Problem

Marketplaces use phone number verification for more than just account creation. Phone number ownership is often treated as a trust signal throughout the user lifecycle — for fraud risk scoring, for matching supply and demand participants, for dispute resolution. If the phone number verification layer is compromised, downstream trust decisions built on top of it are also compromised.

Consider a platform that uses phone number confirmation as part of its worker onboarding process. If attackers can flood that confirmation flow with synthetic numbers, they can create ghost worker accounts that collect sign-on bonuses, referral credits, or promotional incentives without ever performing a real job — while also generating SMS charges at the platform's expense.

Referral and Incentive Abuse

Most consumer marketplaces run referral programs. "Invite a friend, get $10 credit" is a standard growth mechanic. These programs typically require a new user to verify a phone number to claim an incentive. SMS pumping infrastructure can manufacture thousands of unique phone number verifications, each one claiming a referral bonus, at a cost to the attacker that is far below the value of the incentive — particularly if the SMS fees are themselves being recovered through the pumping scheme.

Compounding risk

SMS pumping rarely operates in isolation. A single attack campaign can simultaneously generate SMS fraud costs, claim referral incentives, create synthetic account inventory for follow-on fraud, and corrupt the platform's phone number quality signals — all at once.

Global User Bases and International SMS Exposure

Marketplaces operating internationally face compounded exposure. International SMS routes are significantly more expensive than domestic ones, and the premium range operators that fraudsters work with are often concentrated in specific geographic corridors. A marketplace with users in Nigeria, Indonesia, Bangladesh, or Ukraine — countries that consistently appear on high-risk AIT destination lists — faces elevated per-message costs and higher baseline fraud rates.


Why OTP and SMS-Based 2FA Are Failing

SMS one-time passwords became the default mechanism for phone number verification and second-factor authentication because they solved a real problem elegantly: confirm that a person controls a specific phone number, using infrastructure (the mobile network) that is ubiquitous and independent of the platform.

But the threat model that made SMS OTP reasonable has changed dramatically. The failure is not that SMS OTP is weak in a single dimension — it's that it has become weak in multiple, intersecting dimensions simultaneously.

The Economics Have Inverted

When SMS OTP was designed into platform architectures, the underlying assumption was that sending a code to a phone number was sufficient to establish meaningful identity signal. The cost of the SMS was a rounding error in the overall cost of user acquisition.

SMS pumping breaks this assumption entirely. The act of sending the SMS is no longer a neutral infrastructure cost — it's a vector for financial extraction. The signal (phone number ownership) has been decoupled from the cost (SMS fee), and the cost can now be weaponized independently of the signal.

SIM Swapping Has Eroded the Authentication Value

Even when SMS OTP is functioning as intended — verifying a real person with a real phone — the security guarantee has degraded. SIM swapping attacks, in which fraudsters social-engineer mobile carriers into transferring a victim's number to an attacker-controlled SIM, have demonstrated that phone number control is not a durable proxy for user identity.

The NIST Digital Identity Guidelines (SP 800-63B) deprecated SMS as a sole second factor for high-assurance authentication contexts in 2017 — citing precisely these concerns. The financial services industry took note. Consumer technology platforms, for the most part, did not.

The Verification Loop Can Be Gamed Without Human Presence

The fundamental promise of SMS OTP — that it proves a human controls a phone — depends on the assumption that the OTP actually reaches and is entered by a human. This assumption breaks down in several ways:

Attackers operating against platforms with predictable or numerically sequential OTP formats can conduct brute-force attacks against verification endpoints with insufficient rate limiting. Synthetic identity farms using SIM farms (banks of physical SIM cards controlled by automation) can complete the full receive-and-submit OTP loop without any human involvement. And SS7 protocol vulnerabilities (the signaling system underlying global SMS routing) allow sophisticated actors to intercept SMS messages in transit on specific network segments — a well-documented attack that has been used in targeted fraud against banking customers.

Anatomy of an OTP verification failure
1
Bot submits phone number
Automated system submits a number from an attacker-controlled range, triggering OTP send via platform's SMS aggregator
2
SMS aggregator routes internationally
Message routes through intermediaries to the terminating carrier controlling the range; interconnect fees are billed per-message to the platform
3
Revenue share flows to fraudster
Terminating carrier (complicit or unwitting) distributes a portion of interconnect revenue to the entity controlling the number range
4
Verification loop silently fails
Platform logs an incomplete verification. The cost has been incurred. No fraud flag is raised. The bot moves to the next number.

The Aggregator Layer Is an Opaque Black Box

Most platforms have no visibility into the downstream routing of their SMS traffic. They submit a message to their aggregator API, receive a delivery status callback, and pay the invoice. They cannot easily determine which messages went to which terminating carriers, which number ranges are associated with elevated fraud rates, or whether specific delivery patterns are consistent with pumping activity.

This opacity is not accidental — it reflects the genuine complexity of international SMS routing — but it means that platforms are flying blind at the layer where the fraud is actually occurring.


Technical Anatomy of an SMS Pumping Attack

Understanding the attack in granular technical detail is essential for designing effective countermeasures. What follows is a detailed breakdown of how a sophisticated SMS pumping campaign is orchestrated against a typical digital marketplace.

Phase 1: Target Reconnaissance

Attackers begin by mapping the target platform's SMS-triggering surfaces. This includes registration flows, login flows, phone number change flows, and any other endpoint that triggers an OTP send. They identify rate limits, cooldown periods, and whether the platform validates phone number format before sending.

The platform's SMS aggregator can often be fingerprinted by observing message timing, format, and sender ID — giving attackers information about which number ranges will be most profitable to target (since aggregator routing tables vary).

Phase 2: Number Range Selection

Fraudsters select target number ranges based on the revenue share economics of their carrier relationships. High-value ranges — those with the highest interconnect fees — are prioritized. These are often in countries with less-regulated telecommunications environments where grey-route operators can set artificially elevated termination rates.

Number ranges are typically selected to be superficially plausible: they pass basic E.164 format validation, they correspond to real country codes and plausible area codes, and they don't appear on publicly published blocklists. Sophisticated attackers rotate across ranges to avoid pattern detection.

Phase 3: Bot Deployment

The attack infrastructure typically includes residential proxy networks (to distribute request origins across diverse, legitimate-looking IP addresses), browser automation frameworks (Puppeteer, Playwright, or custom headless browser tooling capable of bypassing standard bot detection), and in some cases, CAPTCHA-solving services that employ human workers to complete challenges in near-real-time.

// Simplified representation of pumping bot logic async function pumpNumbers(targetUrl, numberRanges) { const proxies = await getResidentialProxies(); for (const range of numberRanges) { const numbers = generateNumbersInRange(range); for (const number of numbers) { const proxy = proxies[Math.floor(Math.random() * proxies.length)]; const delay = jitter(2000, 8000); // randomized delay await sleep(delay); await submitRegistration({ url: targetUrl, phone: number, proxy: proxy, fingerprint: generateDeviceFingerprint() // unique per request }); // OTP delivery to attacker-controlled range triggers // revenue share — no completion needed } } }

Phase 4: Traffic Shaping to Evade Detection

Naive implementations of SMS pumping are relatively easy to detect: sudden spikes in OTP sends to a specific country code or number prefix are obvious anomalies. Sophisticated operations use traffic shaping to blend fraudulent requests into the organic noise floor of the platform's activity.

This includes mimicking the platform's organic diurnal traffic patterns (more requests during business hours in a given timezone), targeting number ranges that overlap with geographic regions where the platform has legitimate users, and pacing attacks below the thresholds of any rate-limit monitoring the platform has deployed.

Phase 5: Avoiding Backlash Signals

Fraudsters track whether platforms are implementing countermeasures in real time. If a specific number range starts getting blocked, they rotate to a new one. If a country code starts getting flagged, they shift campaigns to a different corridor. The attack infrastructure is designed for rapid iteration, and the cost of pivoting is much lower for the attacker than the cost of responding is for the platform.


How the Prove Identity Platform Fights Back

How Prove Closes the Gap SMS OTP Left Open

The Prove Identity Platform is purpose-built around a foundational insight: phone numbers are not just a delivery channel for verification codes — they are themselves identity artifacts with rich, verifiable histories. Prove's approach shifts the verification model from "send a code and wait" to "assess the phone number before the first byte of traffic is sent."

This pre-send intelligence — combined with carrier-grade network data that most platforms cannot access directly — is what enables Prove to detect and block SMS pumping attempts before they generate a single fraudulent SMS charge.

Phone Number Intelligence at the Source

Core Layer
Phone Number Risk Scoring

Before any OTP is sent, Prove evaluates the submitted phone number against a real-time risk model that incorporates carrier data, number age, porting history, and SIM swap recency. Numbers associated with attacker-controlled ranges or anomalous activation patterns are flagged before the SMS aggregator is ever called.

Core Layer
Carrier Network Signals

Prove has direct data relationships with major carriers across dozens of countries, enabling access to signals — like recent SIM swaps, line type (prepaid vs. postpaid), and number portability events — that are simply unavailable through aggregator APIs. These signals are particularly effective at identifying the grey-route number ranges that SMS pumping operations rely on.

Verification Layer
Possession-Based Verification

Prove's possession verification goes beyond OTP delivery by leveraging network-level confirmation of device-to-number binding. Rather than asking "did the code arrive?", Prove's approach asks "is this device network-authenticated to this number?" — a check that can't be spoofed by controlling a number range from a remote server farm.

Verification Layer
Trust Score and Identity Graph

Every phone number that passes through the Prove platform contributes to an identity graph that maps device signals, behavioral patterns, and network data. New numbers can be scored against this graph to detect synthetic identities and number recycling patterns that characterize pumping operations.

Risk Layer
Real-Time AIT Detection

Prove's fraud models are trained specifically on AIT and SMS pumping patterns — including the traffic shaping techniques that sophisticated attackers use to evade threshold-based detection. The models look at velocity patterns, number range concentration, geographic anomalies, and device signal consistency simultaneously.

Risk Layer
Error-Based Signal Extraction

Prove's platform extracts intelligence from error signals that most platforms discard — including SMS delivery failures, OTP non-completion rates, and carrier error codes. These signals, when analyzed at scale, reveal pumping campaigns that are deliberately designed to never complete the verification loop.

Stopping the Attack Before the Invoice Arrives

The practical implication of Prove's architecture for identity and risk teams is a fundamental shift in where the fraud boundary sits. Instead of detecting SMS pumping retrospectively — after the charges have been incurred, after the analytics team flags an anomaly in the aggregator dashboard — Prove enables platforms to evaluate and block fraudulent requests at the point of submission.

This matters because the economics of SMS pumping are entirely front-loaded for the attacker. If the SMS is blocked before it's sent, the attacker receives nothing. If it's detected after the fact, the platform can block future requests from the same number range — but the charges for the messages that already went out are not recoverable.

Reducing Dependency on the OTP Loop

For platforms that want to structurally reduce their exposure to SMS-based fraud — rather than simply improving their detection of it — Prove's passive verification capabilities provide an alternative path. By leveraging network-level device-to-number binding, Prove can confirm phone number ownership without triggering an OTP send at all in many cases.

This isn't just a fraud prevention benefit. It also reduces friction for legitimate users, eliminates SMS costs for verifications that don't need them, and moves the platform toward a verification model that is fundamentally more resistant to the class of attacks that SMS OTP was never designed to withstand.

Operational Integration for Risk Teams

Prove's platform is designed to integrate into existing identity and risk stacks via API, with risk signals surfaced as structured scores and decision outputs that can be consumed by existing fraud decisioning systems. For risk teams working with orchestration layers, Prove signals slot into challenge/friction/block decision trees without requiring architectural changes to the verification flow itself.

Prove also provides observability tooling that gives risk teams visibility into the carrier-level signals that are normally opaque — including which number ranges are generating elevated risk scores, which geographic corridors are seeing elevated AIT activity, and how the platform's verification traffic patterns are evolving over time.

The Path Forward

SMS pumping is not a problem that will be solved by carrier enforcement alone, nor by any single platform improving its rate limiting. The incentive structures that sustain it — elevated interconnect fees, opaque revenue-sharing arrangements, fragmented international regulatory oversight — are deeply embedded in the telecommunications ecosystem.

What platforms can control is the quality and completeness of the identity signals they use for verification — and whether they continue to treat the SMS OTP loop as a sufficient identity check in an environment where it demonstrably is not.

The platforms most exposed to SMS pumping share a common characteristic: they made phone number verification a commodity infrastructure decision, delegated to whoever offered the cheapest per-message rate. The platforms that are closing their exposure are the ones treating phone number intelligence as a first-class identity signal — with the data infrastructure to match.

The fraud is sophisticated. The defenses need to be too.

Further reading

For a deeper look at how error handling in SMS verification flows creates additional signal extraction opportunities for fraud detection, see Prove's technical post on error handling in identity verification.

SMS Pumping AIT Fraud OTP Security Marketplace Fraud Phone Intelligence Identity Verification Risk Engineering
No items found.

Keep reading

See all blogs
Read the article: Prove Launches Identity Platform as the Trust Layer for an Agentic World
Company News
Prove Launches Identity Platform as the Trust Layer for an Agentic World

Prove launches the Prove Identity Platform, a unified trust layer that transforms identity verification from a one-time event into a persistent foundation for verifying people, businesses, and AI agents in real time. Built on 12 years of authenticated identity history, the platform delivers adaptive authentication, advanced fraud protection, and proactive identity monitoring across the entire customer lifecycle.

Company News
Read the article: Introducing the Prove Identity Platform: The Identity Infrastructure for the AI Era
Blog
Introducing the Prove Identity Platform: The Identity Infrastructure for the AI Era

Learn how the Prove Identity Platform delivers unified identity infrastructure for the AI era — replacing fragmented verification, authentication, and fraud tools with one persistent, connected system.

Blog
Read the article: Why Tokenization is the Foundation of AI-Ready Identity
Blog
Why Tokenization is the Foundation of AI-Ready Identity

Learn why tokenization is the key to AI-ready identity, enabling persistent, privacy-preserving, and fraud-resistant identity infrastructure at scale.

Blog