JFSA Format RCA Requests and SMS Spam Ticket Handling
JFSA Format RCA Requests and SMS Spam Ticket Handling
Problem
This cluster covers two distinct categories of inbound tickets: (1) legitimate requests from JFSA-regulated clients for formal Root Cause Analysis (RCA) documents related to BitGo service degradation or transaction-processing incidents, and (2) a high volume of automated spam tickets submitted through an external SMS/Freshdesk form (https://moneysms.freshdesk.com/support/tickets/new) that appear as nonsensical, machine-generated subject lines and descriptions. Both ticket types are routed into the support queue and require triage to separate actionable requests from noise.
Diagnostics
- Check the ticket source/origin URL: Spam tickets in this cluster originate from
https://moneysms.freshdesk.com/support/tickets/new. If the ticket was submitted through this external form rather than a known BitGo customer channel, flag it as suspected spam. - Inspect the subject and problem fields: Spam tickets exhibit a consistent pattern — subjects and descriptions contain randomized alphanumeric strings (e.g., subject prefixed with a repeating identifier pattern followed by random uppercase characters). Legitimate JFSA RCA requests reference specific incidents such as "Degraded service" or "Issue processing ETH transactions."
- Verify the Salesforce case reference: Legitimate tickets carry a Salesforce case number (e.g., SF#00087357, SF#00087539) tied to a known customer account. Spam tickets also carry SF numbers (e.g., SF#00198304 through SF#00198351) but these are auto-generated in rapid succession (seconds apart) and are not linked to real customer interactions.
- Check creation timestamps: Spam tickets are created in rapid-fire bursts — often one every 1–2 seconds from the same creator ID. Legitimate JFSA requests are isolated, individually authored tickets.
- Confirm requester identity: Verify whether the ticket creator corresponds to a known JFSA-regulated client or an internal escalation. Spam tickets share a single automated creator ID with no corresponding customer account.
Resolution
Scenario: sms-httpsmoneysmsfreshdeskcomsupportticketsnew-submit-money#spam-bulk-tickets
Trigger: Tickets arrive in rapid bursts with randomized alphanumeric subject lines and descriptions, originating from an external Freshdesk SMS form.
Signals: moneysms, freshdesk, randomized subject, bulk creation, 1-2 second intervals, nonsensical description, external form submission, spam
Steps:
- Identify the batch by filtering tickets created within the same short time window (e.g., dozens within minutes) that share the same creator ID and the characteristic randomized subject-line pattern.
- Confirm the tickets contain no legitimate customer content — subject and description fields are random character strings with no recognizable request.
- Mark all identified spam tickets as spam or close them in bulk with a resolution of "Spam — no action required."
- If the volume is significant or recurring, escalate to the engineering/IT team to investigate whether the external form endpoint (
https://moneysms.freshdesk.com/support/tickets/new) can be blocked or filtered at the integration layer to prevent future ticket creation. - Do not respond to the submitter, as these are automated submissions with no valid customer behind them.
Notes: These tickets do not represent real customer issues. They appear to be automated test or spam submissions routed into the BitGo support queue. No customer follow-up is required. The SF# numbers assigned to these tickets are auto-generated and do not correspond to real Salesforce cases.
Scenario: sms-httpsmoneysmsfreshdeskcomsupportticketsnew-submit-money#jfsa-rca-request
Trigger: A JFSA-regulated client requests a formal Root Cause Analysis document for a specific BitGo service incident (e.g., degraded service, ETH transaction processing issues).
Signals: JFSA, RCA, root cause analysis, degraded service, ETH transactions, incident report, regulatory requirement
Steps:
- Verify the requester is a known JFSA-regulated client by confirming their account and Salesforce case number (e.g., SF#00087357, SF#00087539).
- Identify the specific incident referenced in the request (e.g., "Degraded service," "Issue processing ETH transactions").
- Escalate the RCA request to the appropriate internal engineering or incident-response team, specifying that the client requires the RCA in JFSA format to meet Japanese regulatory obligations.
- Coordinate with the compliance team if regulatory-specific language or formatting is required for the RCA deliverable.
- Once the RCA document is prepared, deliver it to the client through the established secure communication channel and update the Salesforce case accordingly.
Notes: JFSA format RCA requests are regulatory in nature and should be treated as high-priority. Turnaround expectations may be governed by the client's regulatory deadlines — confirm timeline requirements early in the process.
Related
- none identified