CallerID Spoofing

After taking a look at Pindrop Security a startup, focused on preventing phone fraud, with a growing ground swell, I decided to take a little bit of a closer look at CallerID spoofing. Phone number spoofing has been around for awhile and has never been particularly difficult. However, today it is frighteningly more simple than in the past. For those that remember the old days of where spoofing required orangeboxing or trying to use PRI lines to spoof automatic number identification (ANI) or callerID the most recent methods will almost seem like cheating. Today it is as simple as, “go here” ( Actually, one doesn’t even need to go there, these types of sites are a dime a dozen, Spoofcard just happens to seem like a leader.

Also because there are multiple iPhone apps that one could utilize to leverage Spoofcard, like iSpoofCard or probably the more popular “Phone Gangster” which can be downloaded from Apple iTunes. Usage is simple, merely input the number to be called and the number to be spoofed and then make the call. There are also voice masking features etc. However, via Phone Gangster they really aren’t anything particularly special.

One thing to keep in mind is that even though these services claim, “CallerID Spoofing” most cellphones do not have CallerID on them. Rather they are capable of detecting an ANI. The primary difference is that CallerID displays the name of the person billed associated to a particular number and not just the number itself. However, if the target has the number being spoofed saved in their phone, it will show up as a call from that person and not just their number.

If all that seems too boring or seems like cheating, well, one could always set up their own IP-PBX with Astericks.

Comments are closed.