This article describes how in less than two decades, internet in mobile phones has grown from a curiosity to an essential element of modern life. Although, this mind-boggling growth has no doubt facilitated international commerce, trade, and travel, it is also being used in the planning and coordination of criminal activities. These types of attacks are often referred to as socio-technical attacks. These attacks are targeted at these sensitive points to society or national security and may have a devastating impact. Often, organized, sponsored, and trained groups are involved to disguise the intelligence system, deployed for the detection of such attacks. Prior detection of such attacks may reduce its impact. In this article, the authors have developed an efficient model to detect malicious node in huge and complex corpus of data associated with call detail record (CDR). This model analyses CDRs to identify covert nodes operating within society for malicious intent.