Caller ID spoofing: how scammers fake phone numbers

If you've ever answered a call that showed your bank's number on the screen, only to find a scammer on the other end — you've met caller ID spoofing. The display name on your phone is, surprisingly, just a piece of text the originating phone system can set to almost anything. Here's how it works, why it's still happening despite Australian regulation, and what you can do about it.

What is caller ID spoofing?

Caller ID spoofing is the practice of forging the phone number (and sometimes the name) shown on the recipient's phone. Instead of the call appearing as "Unknown" or showing the real originating number, the screen shows whatever the scammer wants you to see — your bank, the ATO, an Australia Post depot, or even your own number.

The technical name for the data being faked is Calling Line Identification (CLI) in Australia, or Caller ID internationally. It travels through the phone network as a separate field from the actual call routing. Crucially, the network historically didn't verify whether the originating party had any right to use the number it claimed to be calling from.

How scammers actually do it

Almost all spoofing today happens through Voice over IP (VoIP). Most overseas VoIP gateways let the originating party set the CLI to any string. From a scammer's perspective, the workflow looks like this:

  1. Buy access to a VoIP termination service that hands off calls into the international PSTN.
  2. In the dialler software, set the "from" number to whatever they want — say, a real Commonwealth Bank service line.
  3. Place the call. By the time it reaches an Australian carrier and lands on a customer's phone, the spoofed CLI has propagated through several systems that don't (or can't) verify it.

From the recipient's view, there's no obvious tell — the screen just shows the bank's number. A naïve callback would even reach the real bank, because the displayed number is genuine; it just wasn't actually used to make the call.

"Neighbour spoofing" — why local numbers feel safer

One of the most effective spoofing tactics is neighbour spoofing: the scammer matches the area code and the first few digits of the recipient's own number. A 0412 phone gets calls from 0412, 0413, 0414. A landline in the 02 9XXX range gets calls from numbers in the same exchange.

Why does it work? Familiarity bias. We're more likely to answer a number that looks like a local mobile or a nearby exchange than a 1300 or international prefix. Scammers know this and tune their dial-out lists accordingly. If you've noticed an uptick in calls from your own area code that you don't recognise, neighbour spoofing is almost certainly why.

What Australia is doing about it

The ACMA (Australian Communications and Media Authority) has been gradually tightening the rules:

Australia doesn't yet mandate STIR/SHAKEN — the cryptographic call-authentication framework now mandatory in the United States and Canada — but the ACMA's working groups have flagged it as the longer-term direction. In the meantime, the rules-based blocking catches a lot, but determined scammers still get through, especially via offshore origination.

How to spot a spoofed call

What if your number is being spoofed?

If you start getting angry callbacks from people you've never called, your number has been picked up by a spoofing operation. There's not a lot you can do to stop it — your phone wasn't compromised; the scammer is just using your number on the outbound CLI of someone else's calls. But:

What it means for looking up unknown numbers

Spoofing has a knock-on effect: a number you look up on Phony might have a clean reputation despite being used (without the owner's knowledge) in a recent scam wave. That's why Phony combines three signals — the number itself, the community reports, and any matching threat alerts from Scamwatch and other sources. A clean record on a real Australian number, paired with a fresh scam alert about that exact number being spoofed, tells you what's actually going on.

If you've answered a call where the number on your screen feels too good to be true — or too official — assume it might be spoofed, hang up, and call the real organisation on the number from their website. It costs you 30 seconds and rules out the most common attack vector instantly.