What Can Scammers Do with Your Phone Number?
When cell phones first became popular, no one thought they’d become what they are today. For the first few years, it was …
A Google Voice scam occurs when criminals trick someone into revealing a Google Voice verification code. This allows them to seize control of a Google Voice number linked to that person’s phone.
Once scammers obtain the code, they can create or take over an account in the victim’s name. They may then use the fake identity to impersonate the victim and engage in various fraudulent activities.
An overview of how the Google Voice verification scam works in practice (Source: LifeLock)
Numerous reports indicate that the scam tends to start with online transactions. More specifically, when someone is selling items on Facebook Marketplace or answering an online ad about a lost pet.
Because these steps seem harmless at first—especially if the victim is keen to sell an item or find a lost pet—many victims hand over the verification code before realising it doesn’t serve any actual purpose.
Scammers may contact employees and claim they need to verify their identity for a reason that sounds believable at first—perhaps to confirm a job interview, vendor application or transaction.
They then ask to send a Google Voice verification code and convince the employee to read it back. This allows the scammer to hijack the business number for any number of fraudulent schemes such as payment redirection scams, executive impersonation (CEO fraud) and phishing.
In accounts payable contexts, the tactic could be employed to support invoice scams. Some may even follow up with phone calls or texts from what appears to be a company phone number.
To pull off this imitation, hackers use spoofing software that enables calls placed from the Google Voice account to display the victim’s (or a trusted superior’s) real phone number.
The added credibility makes it easier to deceive staff into processing unauthorised payments.
When finance or AP staff fall for a Google Voice scam, the broader implications for the business can be severe.
Hijacked numbers may be used to:
The most effective defence from Google Voice scams is strong security awareness. If anyone is asked to provide a verification code—regardless of the context—it should be treated as a red flag for fraud.
The simple (but often overlooked) instruction that accompanies a standard 6-digit verification code (Source: Aura)
Finance and accounts teams should also keep the following precautions in mind:
If a breach is suspected, immediately update all credentials linked to the compromised account and enable multi-factor authentication (MFA) where possible.
Recovery involves following Google’s support instructions to recover the hijacked account. Victims must enter the number they want removed from a Google Voice account and verify ownership with an OTP.
To help contain the scam, it’s important to make friends, family and coworkers aware of it—particularly if criminals intend to contact known associates. It’s also crucial to respond to the breach as quickly as possible to contain any damage.
When cell phones first became popular, no one thought they’d become what they are today. For the first few years, it was …
When Mr. Beauchamp watched a video of Elon Musk – the world’s richest man – recommend a certain investment platform to make …
Your company delivered the good or service it promised to a client and now it’s time to collect the funds owed to …
Eftsure provides continuous control monitoring to protect your eft payments. Our multi-factor verification approach protects your organisation from financial loss due to cybercrime, fraud and error.