Skip to main content

Grey_Routes-ThumbnailIn this guest blog post, Syniverse’s Chris Wright, Senior Carrier Services Director, explores the murky depths of “grey route” text messaging whereby fraudulent messages can be sent to individuals by unscrupulous spammers and scammers. The post looks at how these pertain to operators, how they have grown, how they hurt operators and how they can be stopped. For even more insight, check out the accompanying podcasts which look at the threat for enterprises and what can be done to counter it.

In a mobile world of multiple devices, operating systems and service providers, SMS continues to be one of the world’s most popular mobile channels, uniquely offering a singular channel through which all mobile users can communicate. However, the qualities that make text messaging so attractive as a channel also make messaging a target by those who seek to take advantage of its ubiquitousness.

One increasingly serious threat is “grey routes,” or low-quality messaging routes that cost operators millions of dollars in lost revenues each year. Grey routes pose a grave risk to the operators whose networks are inappropriately used, the enterprises whose reputations and business operations can be irreparably damaged, and the mobile users who can become victims of fraudulent schemes and spam. It’s imperative that these routes be shut down since they can cause harm to so many parts of the mobile ecosystem.

1. What are grey routes exactly?
Grey routes are basically fraudulent messaging. They’re A2P [application to person] messages, such as marketing or spam messages blasted to thousands of people, that are questionably riding on the dedicated P2P [person to person] connections of operators. More specifically, a “white route” is said to be one on which both the messaging source and destination have a legitimate termination agreement in place. This is opposed to a “black route,” which is one that is illegal on both ends. In between white and black routes are grey routes, which are legal on one end but illegal on the other, and these routes are particularly difficult to detect.

2. How has the problem of grey routes grown over the past few years?
Grey routes have been a major problem for the mobile industry. Over the past year, we’ve seen a 15 percent growth in grey route detection. However, we see that rate is definitely going to grow in 2014 to 25 percent or higher.

[soundcloud url=”″ params=”auto_play=false&hide_related=false&show_comments=true&show_user=true&show_reposts=false&visual=true” width=”100%” height=”300″ iframe=”true” /]

3. What is the biggest threat that grey routes pose?
The critical reason why operators must detect and block these routes is loss of revenue. Simply put, when someone uses a grey route to terminate traffic, that entity is riding an operator’s route without paying for the access, and as a result that entity is able to offer a very low price for that service. In fact, the price charged to deliver a message through a grey route can be anywhere from five to 10 times as less as a message on a direct connection by a legitimate mobile service provider.

Another crucial threat is fraud and its ramifications. This includes, for operators, the damaged reputation they can suffer as a result of their subscribers receiving fraudulent schemes and spam messages on operator networks. The threat also includes, for enterprises, the financial loss to any of their customers that is caused by grey route scams that are maliciously attached to particular company names.

4. What are some of the most effective ways to combat grey routes?

wrightChris Wright

Senior Carrier Services Director


color-linkedin-128 color-twitter-128 color-link-128

Today, there are several factors affecting the impact of grey route traffic. One of the most significant of these is how grey routes are being detected. Previously, a manual mechanism was used where inbound and outbound ratios were compared to identify if there were any imbalances. Now, though, the industry is moving toward a more technologically advanced automated detection method. With this process, different elements within the message itself are examined to determine if messages are coming from an A2P provider likely to be using grey routes, or a P2P provider, a true mobile operator. With this type of detection method, we can identify, confirm and block a grey route within seconds, compared to weeks or months using the manual method.

This post originally appeared on Synergy – The Syniverse Blogazine, and is reused here with kind permission.