How Scammers Fake Phone Numbers To Look Like Your Bank

phone scam, caller ID spoofing, bank fraud, vishing, social engineering, one-time passcode, identity theft

Your Bank Is Calling. Except It Isn't.

Your phone rings. The screen says "Chase Bank" — or Wells Fargo, or whatever bank you use. You answer because of course you do. A calm, professional voice tells you there's been suspicious activity on your account and they need to verify your identity before it's too late.

You're already reaching for your card.

This is called a vishing attack — voice phishing — and the fake caller ID is the hook that makes it work. Most people never question a call that looks like it's coming from a number they recognize. That recognition is the whole con.


The Trick Has a Name: Spoofing

The technology behind this is called caller ID spoofing, and it's shockingly easy to pull off. Scammers use internet-based phone services (called VoIP) that let them type in whatever number they want to appear as the caller. No hacking required. No special equipment. Some services charge less than a few dollars per month.

According to the Federal Communications Commission, spoofing itself isn't always illegal — businesses legitimately mask their internal extensions with a single outbound number all the time. The crime is when it's used to defraud. That legal gray area is part of why it's so hard to shut down.

The number that shows up on your screen isn't verified by your phone. Your carrier delivers the call with whatever label the sender attached to it, like an envelope you can write any return address on. Your phone just displays what it's told.


Why Your Bank's Real Number Makes You More Vulnerable

Here's the counterintuitive part most articles skip: the fact that you've saved your bank's number in your contacts actually works against you.

When a scammer spoofs a number you've already labeled "Chase Fraud Dept," your phone doesn't show an unknown number — it shows the name you gave it. Your own contact list becomes the con artist's accomplice. You see a trusted name, your guard drops before you even say hello.

This is why the advice "check if it's a number you recognize" is nearly useless against spoofing. Recognition was specifically engineered into the attack.


What the Call Actually Looks Like

The script is more polished than you'd expect. The caller knows your first name. They reference your bank correctly. They might even read back the last four digits of your card number — data that's been sitting in a leaked database from some breach years ago that you've long forgotten about.

They create urgency: a transfer is in progress, your account will be locked, you need to act in the next few minutes. Urgency is the enemy of skepticism. When you feel rushed, the part of your brain that asks "wait, does this make sense?" goes quiet.

According to the FBI's Internet Crime Complaint Center (IC3), phone-based fraud consistently ranks among the highest-loss crime categories — not because victims are naive, but because the social engineering is sophisticated and timed to catch people off-guard.


What They Actually Want

It's rarely your card number directly. Banks have fraud detection that flags unusual transactions, and scammers know this.

What they're really after is one of three things:

  • Your one-time passcode — the text message your bank sends when you log in. If they can get you to read that number aloud, they can log into your account in real time while you're on the phone with them.
  • Verbal confirmation of personal details — enough to pass a bank's identity verification and authorize a wire transfer themselves.
  • Permission to "reverse" a fake charge — which actually authorizes a real one.

The one-time passcode angle is particularly effective because victims think they're helping stop fraud, not enabling it. You're handing them the key while believing you're changing the lock.


What You Can Actually Do

The most effective defense is also the most uncomfortable one: hang up, then call back.

If someone calls you claiming to be your bank — even if the number looks right — don't continue the conversation. Tell them you'll call the bank directly. Use the number on the back of your physical debit card or the official website. Not a number the caller gives you, not a Google result, not a recent call in your history.

A real fraud team will not be offended that you hung up and called back. A scammer will try to talk you out of it, citing urgency or telling you that will take too long. That resistance is itself a red flag.

Three specific habits that actually help:

  • Set up a verbal passphrase with your bank if they offer it — some banks allow you to register a secret word that their agents will use to identify themselves to you.
  • Never read a one-time passcode aloud to anyone who called you, no matter what they claim. Your bank will never ask for this.
  • If you're unsure mid-call, ask for a case or reference number, hang up, and call the official number. Real cases have real numbers.

According to AARP's Fraud Watch Network, one of the most reliable tells is that legitimate organizations give you time. Scammers manufacture urgency because patience is their enemy.


The Honest Caveat

Here's what none of this solves: if you do everything right and still get spoofed, recovering money lost to a phone scam is genuinely difficult. Banks sometimes cover fraud losses, but wire transfers and peer-to-peer payments like Zelle are often treated differently from card fraud — and the legal definition of "authorized" gets complicated when you were the one who approved a transaction under false pretenses.

The system that allows caller ID to be faked is a structural flaw in how phone networks were designed, and regulatory fixes have been slow and incomplete. STIR/SHAKEN, the technical standard meant to authenticate calls, is being rolled out — but it doesn't cover all carriers and doesn't stop spoofing from outside the US.

Skepticism is your actual firewall. Not a perfect one, but the only one you have.


Sources:

  • Federal Communications Commission
  • FBI Internet Crime Complaint Center (IC3) 
  • AARP Fraud Watch Network
Share: