The phone rings. The screen shows your bank’s number. The voice says there is a problem with your account and you need to act fast. Within minutes, your savings are gone.
This is not a rare story. It plays out countless times a day, across every continent. And it is made possible by a technique that telecom networks have yet to fully stop: caller ID spoofing.
According to the CFCA’s latest data cited by TNS, global telecom fraud losses reached $41.82 billion in the most recent reporting period, up from $38.95 billion in 2023. Experts say even that number misses most of the damage.
The real cost of spoofed calls is far higher than reported
The CFCA figure tracks losses sustained by telecom operators themselves, covering billing fraud, network abuse, and wholesale theft. What it leaves out is the money consumers lose after picking up a spoofed call.
The official figure barely scratches the surface, says Eric Priezkalns, editor of industry publication Commsrisk. “Drawing on statistics presented by police forces and consumer affairs bodies worldwide, we can say with absolute certainty that consumers are losing far more to phone scams than industry surveys suggest,” he told TheStreet.
CFCA surveys rely on voluntary participation from operators, many of which lack detailed tracking systems or avoid associating their brand with fraud data.
More Telecom News:
- T-Mobile drops 2 new phone plans to stop customers from fleeing
- Verizon CEO shifts gears after 2.25 million customers depart
- AT&T closes billion-dollar acquisition to win back customers
The spoofing threat driving those consumer losses has also grown more accessible. Organized fraud networks now sell ready-made kits and calling services online, allowing low-skill operators to run impersonation campaigns at industrial scale.
The most financially destructive application is Authorized Push Payment fraud, or APP fraud, where victims are manipulated into transferring money directly to criminals. According to Deloitte, U.S. losses from APP fraud could hit nearly $15 billion annually by 2028.
What makes APP fraud so effective over voice:
- Between 45 and 50 percent of APP attacks originate over the traditional voice channel.
- Spoofed numbers allow scammers to impersonate banks, government agencies, and telecoms convincingly.
- Social engineering over a live call creates urgency that leaves victims little time to verify.
- Transfers are often instant and irreversible once completed.
The industry’s main defense against call spoofing has a critical flaw
Most carriers use filtering systems that scan for suspicious call patterns. When fraud is detected, the offending number gets blocked. It sounds reasonable. But there is a structural problem baked into the approach.
“The first set of fraudulent calls will generally connect successfully, since traditional anti-fraud systems rely on historic data first being generated in order to ‘block it next time,'” Arnd Baranowski, CEO of telecom software firm Oculeus, told TheStreet. “So a certain number will always get through first.”
By the time a carrier updates its block list, scammers have already moved on to fresh numbers and new targets. The GLF Fraud Report found CLI spoofing is now the top concern among operators globally, with 55 percent reporting high volumes, up from 49 percent the prior year.
Meanwhile, 76 percent of carriers say fraudulent calls have meaningfully eroded subscriber confidence, pushing users away from voice altogether.
What reactive call filtering cannot stop:
- First-wave calls from any new spoofing campaign, which always connect before the number is flagged
- Scammers rotating through fresh numbers faster than block lists can update
- Calls routed through carriers that have not yet deployed filtering tools
- AI-assisted spoofing operations that generate new numbers at scale
Most phone carriers use filtering systems that scan for suspicious call patterns, but this is a reactive rather than proactive approach.
Economou/Getty Images
Real-time caller identity verification changes the equation
A fundamentally different approach is gaining ground, according to Baranowski.
He advocates that rather than blocking known bad numbers after the fact, real-time authentication systems can verify a caller’s identity during the call setup process itself, before the phone ever rings.
These systems operate at the call setup level, verifying whether the originating number is legitimate before the connection is established. The authentication happens in milliseconds. If the number fails verification, the call never reaches the recipient at all.
The catch is participation. Both carriers in the chain need to be enrolled for the system to work. Carriers that hold back become the weakest link.
“Operators that choose to decline to join the collaboration face being targeted by ever higher volumes of fraudulent traffic as the fraudsters run out of soft targets,” Baranowski said.
Asked what percentage of spoofed fraud calls would stop under full industry participation, Baranowski did not hesitate: “The short answer is 100%.”
Collaboration for telecom fraud prevention is now a commercial imperative
Regulatory pressure is mounting globally. The FCC tightened rules on robocalls and VoIP fraud in 2024. Regulators across the EU and Asia-Pacific have introduced similar consumer protection mandates. Each new rule shifts more liability onto carriers that have been slow to act.
Regulation sets the floor. But it cannot close the technical gap on its own. Real-time authentication only works at scale. A spoofed call crossing three networks is only as secure as the carrier that has not yet acted. That makes industry collaboration not just a technical preference, but also a commercial necessity.
Related: T-Mobile adds free new service as it loses phone customers