In this article:
In this article:
If scammers have spoofed your phone number, you could end up with a massive phone bill or worse. Learn what to do if your phone number is being spoofed.
In this article:
In this article:
That’s the question one Reddit user was pondering when she started receiving frantic and distressed messages from strangers asking why she kept calling them. Confused, she checked her call history — but there was nothing. She soon discovered that her phone number had been spoofed and was being used to scam an untold number of victims [*].
Caller ID spoofing allows fraudsters to use the telephone numbers of innocent people in order to avoid block lists, as well as target and trick victims into sharing personal information or money.
In 2023 alone, Americans lost $850 million to scams that started with phone calls [*].
While some victims of phone number spoofing are able to fix the problem by changing their phone numbers, security experts agree that a spoofed phone number could be a warning sign of larger security risks.
In this guide, you’ll get a better understanding of what phone spoofing is, how it happens, and what to do if your phone number is targeted.
{{show-toc}}
Phone spoofing occurs when fraudsters manipulate caller ID information to make it appear that they’re calling from somewhere else — usually a local number or area code (known as “neighbor spoofing”) — or from government agencies like the Internal Revenue Service (IRS), Social Security Administration (SSA), or Federal Bureau of Investigation (FBI).
If you answer the incoming call, the scammers try to persuade or threaten you into either giving up sensitive personal information or sending them money.
What makes spoofing so frustrating is that fraudsters don’t need access to your phone to use your number. Instead, spoofers use Voice Over Internet Protocol (VoIP) technology to falsify the information that shows up on your caller ID.
If you’re one of the unlucky victims whose number is chosen by phone spoofing scammers, it can lead to damaging and scary consequences, such as:
The good news is that scammers tend to switch spoofed numbers often. If you’re getting angry calls and texts now, there’s a good chance they will stop soon — once the scammer moves to another victim’s number.
Still, having your phone number spoofed is never a good sign and can often be a symptom of a larger and more dangerous issue.
If scammers start spoofing your phone number, it’s most likely not a completely random accident. Instead, it could mean that your phone number has been compromised in one of several ways, such as:
🛟 Related: How To Know If Your Phone Has a Virus →
Unfortunately, phone spoofing itself isn’t illegal and even has some practical applications — for example, doctors may “spoof” their personal cell phone numbers when calling patients in order to maintain privacy.
Spoofing is only against the law when used for harassment or fraudulent activity, as stipulated in the Truth of Caller ID Act of 2009 [*].
If you’re having problems with call spoofing and think your number was compromised, here are a few steps you should take:
If you suspect your phone number is being used in spoofing scams, you should contact your phone service provider as soon as possible.
Carriers like AT&T, T-Mobile, and Verizon have online reporting systems for submitting complaints. Unfortunately, most fraud support pages focus on helping those who have been the target of spoofed calls — not people whose phone numbers have been spoofed. Still, it’s worthwhile to submit a detailed report, especially if the incident results in SIM swapping or a high service bill.
🛟 Related: How To Identify a Scammer on the Phone →
Both iOS and Android devices have security settings and functionality that can protect you from receiving and unknowingly making scam calls from your phone. If your phone number or SIM have been compromised, these settings can stop scammers from using your phone number.
For example, to restrict outgoing calls to just your contacts on iPhone:
You can also block or silence unknown incoming calls on both Android and iOS devices under your phone settings.
🛟 Related: How To Know If Your Phone Has a Virus →
If your phone number has been spoofed, you’ll likely get a lot of angry callback messages. Strangers often call back unknown numbers in order to stop the spam calls.
While a helpful voicemail won’t stop the calls, it can help to explain the situation to victims and reduce the chances that they’ll keep calling you. In your new message, explain that a scammer has taken your number hostage. Apologize for the inconvenience and suggest that the caller block your number.
While you’re at it, take this moment to update your voicemail password. If you leave your voicemail unsecured and hackers gain access to your phone number, they can listen to your voicemail messages and find potentially sensitive information.
If fraudsters hijack your number for spoofing purposes, they might go further by initiating a SIM swap scam.
SIM swapping occurs when a scammer uses social engineering to trick your phone carrier into connecting your phone number to a SIM card owned by the scammer. For example, they may impersonate you and claim that "you" lost your old SIM card or phone and need them to switch your phone number to a new SIM card. This allows fraudsters to take control over your phone number.
SIM swaps help scammers get past secure login settings that require two-factor authentication (2FA). For example, if they have access to the username and password for your bank account, a SIM swap with your phone number means that your bank’s 2FA verification code will be sent to the scammer’s phone (instead of yours).
Problems that seem like basic phone malfunctions could indicate a SIM swap. Look out for issues with receiving and sending text messages and calls, loss of access to your online account with your phone carrier, service change notifications from your carrier, or any other unusual activity.
🛟 Related: Did Someone Open a Cell Phone Account In Your Name? Do This →
Ask your mobile carrier if they offer any security services that cover spam calls and calls from spoofed numbers.
AT&T’s ActiveArmor program and Call Protect App, and T-Mobile’s Scam Shield app are examples of scam protection services offered by phone network providers. AT&T, for instance, may label spam calls as "Spam Risk" as a forewarning.
You can also use a third-party call blocking app to help block robocalls, text spam, scam calls, and more. Popular options include:
A third option is to use Aura's spam call protection features. Once enabled, this can block known spam (or scam) callers and filter unwanted messages. You can even set up intent-based filtering to allow our AI Call Assistant to forward legitimate calls.
🛟 Related: How To Stop Spam Texts on Android and iPhone →
Unwanted calls, including illegal spoofing calls and robocalls, are the number one consumer complaint received by the Federal Communications Commission (FCC) [*].
Complaints help bring awareness to the issue and can provide important documentation in case you need to recover assets lost due to identity theft. Filing a complaint may also help protect potential victims in the future.
To file a complaint, visit ConsumerComplaints.fcc.gov and select the type of report that best describes your situation.
You should also file a report with the Federal Trade Commission (FTC) at ReportFraud.ftc.gov if you’ve been a victim of fraud. You may need to provide an FTC report as proof later if you seek to recover assets due to identity theft.
Changing your phone number is a hassle. In most cases, you’ll want to wait a few days before switching your phone number so that you can see if the scammer moves on to a new number. But if you’re still seeing signs of spoofing weeks later, you might need to change your number.
Plus, if scammers know your phone number, you’ll always be more vulnerable to identity theft and fraud.
🛟 Related: Why Am I Getting So Many Spam Calls? (How To Stop Them) →
Scammers can do a lot of damage with a little information, and your phone number is just one possible entry point.
Identity theft protection covers so much more and can help stop scammers and cybercriminals from accessing your sensitive information, bank accounts, and personal data.
With Aura’s award-winning identity theft protection solution, you get:
🛟 Related: Why Do Random Numbers Keep Calling You? →
You might think scammers obtain all personal information illegally. While that’s sometimes the case with documents like birth certificates and Social Security numbers, other important information is in plain sight — and you might have even posted it on the internet yourself.
Protect yourself from scammers by reducing the amount of your information available online. Remove sensitive data from your online profiles and social media accounts — or at a minimum, change the security settings so that your data is only visible to your approved contacts. Even basic information like your hometown or birth date can be valuable information to an identity thief.
Some other helpful steps involve submitting information removal requests to websites that might be storing data about you:
🛟 Related: How To Remove a Hacker From Your Smartphone →
A spoofed phone number is concerning. But with the right recovery steps, there’s a good chance that you can resolve the issue. And don’t stop there. A compromised phone number is a warning sign that your identity might be quietly under attack.
If you want to shield more than just your phone number, Aura’s top-rated digital security solution can safeguard your personal information and online activity across all your devices, remove your information from data broker lists, and monitor the Dark Web for leaked data.
And if the worst should happen, every adult member on your Aura plan is covered for up to $1 million in insurance for eligible losses due to identity theft.
Editorial note: Our articles provide educational information for you to increase awareness about digital safety. Aura’s services may not provide the exact features we write about, nor may cover or protect against every type of crime, fraud, or threat discussed in our articles. Please review our Terms during enrollment or setup for more information. Remember that no one can prevent all identity theft or cybercrime.