A day in the life of a prolific voice phishing crew
Call Handling Habits & Tradeoffs
- Many participants ignore unknown numbers entirely, or use iOS “Silence Unknown Callers” and call-blocking apps.
- Others answer but stay silent or put the phone on mute to waste scammers’ time. Some “play” with scammers for amusement.
- Several warn that answering may mark a number as “active” and increase spam; others say they already get so much spam it doesn’t matter.
- Parents and people expecting real callbacks (contractors, doctors, schools) are reluctant to block unknown numbers, citing risk of missing important calls.
- Voicemail is a common filter, though some note it’s still more work than just answering a legitimate call directly.
Examples of Scams & Social Engineering
- Apple- and Google-branded phishing attempts, fake medical debt collections, USPS/Royal Mail delivery-fix scams, and Mandarin/Chinese embassy “immigration” threats are frequently reported.
- A landline scam is described where the attacker never releases the line, then impersonates the victim’s bank when they “call back.”
- Commenters highlight the complexity of US medical billing as fertile ground for debt-collection scams.
- Voice cloning and “voice verification” banking are seen as creating new risk: once your voice is captured, it can be reused.
Telecom Infrastructure & Caller ID Spoofing
- Many see caller-ID spoofing as a root problem; non-technical people often trust caller ID implicitly.
- Email-style authentication analogies (DMARC/DKIM/SPF) are raised; STIR/SHAKEN and FCC efforts are mentioned, with mixed views on effectiveness and deployment speed.
- Some note specific countries where spoofing is rare or now regulated, showing that stricter rules and telco enforcement can help.
- Skepticism persists that carriers genuinely prioritize spam reduction over revenue.
Targets, Crypto vs. Traditional Banking
- Several note that voice phishers prioritize crypto holders because transfers are fast and irreversible; others point out that traditional banking fraud still dwarfs crypto losses.
- One takeaway: assume any inbound communication about money is suspect; independently contact institutions using verified channels.
Defensive Practices & Education
- Core advice: hang up on unsolicited “Apple/Google/bank” calls and initiate contact via official numbers.
- Some banks now provide in-app indicators confirming whether an ongoing call is genuine.
- Commenters argue for more public service announcements, especially for older, TV-watching audiences, using real scam scripts to build intuition.