Google Voice “Verification Code” Scam: Don’t Be the Next Victim

The Google Voice verification code scam is a fraudulent activity where scammers hijack your phone number to create a Google Voice account in your name. They then use the account to scam other victims while remaining undetected. This scam has become increasingly common, especially for those who post phone numbers publicly online. If you’ve ever received an unsolicited text or call asking for a verification code, you may be targeted.

This comprehensive guide will provide an in-depth look at how the Google Voice scam works, what to do if you’re a victim, and how to protect yourself moving forward.

Time to win.com scam

Overview of the Google Voice Verification Code Scam

The Google Voice scam typically begins when a scammer finds your phone number listed online, often in classified ads or social media profiles. They will contact you posing as an interested buyer or follower and build some rapport. At some point, they will ask you to provide a six-digit verification code texted to your phone by Google.

Unknowingly, you are providing the code the scammer needs to hijack your number and create a Google Voice account in your name. Once they have access, they can use the account to scam other victims while calls and texts are forwarded to your number. You may never hear from that scammer again.

Meanwhile, they are carrying out various forms of fraud under your identity. Some common scenarios include:

  • Robocall scams: The scammer uses the Google Voice number to make large volumes of robocalls promoting fraudulent services, spreading misinformation, or harvesting personal information.
  • Tech support scams: Posimg as a technology specialist, the scammer contacts victims claiming their computer has a virus or other issue that requires immediate tech support and payment.
  • IRS/government imposter scams: The scammer pretends to be calling from the IRS or other government agency claiming the victim owes money and demanding payment.
  • Romance scams: Developing a fake online relationship for months, the scammer eventually asks for money for an “emergency” or other fictional reasons.
  • Employment scams: Advertising fake job opportunities, the scammer collects applications and personal information for identity theft.
  • Grandparent scams: Posing as a relative in need, the scammer calls victims asking for wire transfers to pay for emergencies, hospital bills, or other fake circumstances.

These are just a few examples of how these accounts are used criminally. In many cases, the victims being scammed by calls from your number have no idea it has been compromised. The activity appears tied only to you.

Google Voice scammers prefer using hijacked numbers rather than spoofing technology because it allows them to bypass security systems designed to detect spoofed robocalls. Your number essentially gives them cover to carry out all types of fraud without being caught.

This scam has been around for over a decade but remains problematic due to the ubiquity of phone numbers listed online. Classified ad sites like Craigslist are common targets, but social media profiles, business websites, and local directories can also expose you.

Staying vigilant about verification code requests and understanding how this scam works is key to protecting yourself.

How the Google Voice Verification Code Scam Works

Google Voice is Google’s phone and messaging service that provides users with a virtual phone number. Among other features, it allows calls and texts to your Google Voice number to be forwarded to your cell phone or landline.

To activate a new Google Voice number, you must complete a multi-step verification process. This is where scammers are able to trick unsuspecting victims into handing over access.

Here is a step-by-step overview of how the Google Voice verification scam works:

1. Scammer finds your phone number listed online.

The first step is the scammer identifying your phone number on a public website, social media profile, classified ad listing, or other online directory. Displaying your contact information online makes you an easy target.

2. Scammer initiates contact posing as a legitimate lead.

Once they have your number, the scammer will initiate contact via call or text. They often pose as an interested buyer for an item you are selling online or a fan responding to a social media profile. The goal is to build some rapport before asking for the verification code.

3. Scammer asks you to relay a verification code sent by Google.

After some friendly conversation, the scammer will ask you to provide a six-digit verification code that they claim Google sent to your phone. They may say they accidentally reported your number as spam, their Google account was hacked, or that Google requires the code to confirm your identity.

In reality, the code is being sent because the scammer is attempting to register your number with a new Google Voice account. But this is not revealed to the victim.

4. You unknowingly provide the verification code to the scammer.

If you provide the six-digit code to the scammer, you are giving them the last piece they need to finalize creation of a Google Voice account in your name. Some key points:

  • Google sends the code via text message without any context. Victims are unaware it’s for a new account creation.
  • Google allows multiple Google Voice accounts to use the same verified forwarding number. So your number can be associated with multiple scam accounts.
  • The scammer only needs this code once. After the first successful scam, your number is compromised for future abuse unless you take action to resecure it.

5. Scammer gains access to utilize your number on a fraudulent Google Voice account.

After receiving the code from you, the scammer can complete creation of the Google Voice account using your phone number.

Now the scammer has a virtual phone line tied to your number without your consent. All calls and texts to this fraudulent Google Voice number will be forwarded to your cell phone or landline.

6. Scammer uses account to anonymously carry out other scams.

With access to a Google Voice number linked to your phone, the scammer can now impersonate you or remain anonymous while carrying out all kinds of fraudulent activity.

As covered earlier, common scenarios include robocall scams, tech support fraud, government impersonator scams, romance scams, employment scams, and more.

Meanwhile, you may receive increased calls and texts from victims who were contacted by “your” hijacked number and do not realize it has been compromised.

7. You may never hear from the scammer again.

After gaining access to your number, the original scammer who contacted you may never reach out again.

In most cases, they move on to scam other victims using your Google Voice account. You are left dealing with the aftermath once you realize your number has been hijacked.

This simple but devastatingly effective scam takes advantage of unaware victims to enable widescale fraudulent activity. A few moments and a six-digit code is all it takes to hijack your identity and damage your reputation.

What to Do If You Are a Victim of the Google Voice Scam

If you mistakenly provided a verification code and your number has been hijacked, here are important steps to take:

Disassociate your number from the scammer’s Google Voice account.

You can do this through your Google account settings. This will remove your phone number as a forwarding option from the fraudulent account.

However, it may already be linked to multiple accounts, so continue monitoring for suspicious texts and calls.

Report the account to Google.

Google allows you to report compromised or fraudulent accounts. Submit details to their Voice and Number Abuse team for investigation.

Reset the voicemail PIN on your cellular account.

The scammer may access and change your voicemail PIN to set up call forwarding. Reset this PIN to block the scam account.

Contact your phone carrier.

Your carrier may be able to block your number from being ported without further authorization. This prevents it from being hijacked again.

Report the phone number as spam.

Use spam reporting tools on your phone, through carriers, and on websites to flag the scam number. This helps limit use and caution others.

Leave honest reviews about the scam.

Where possible, leave reviews about being scammed on sites like Craigslist to make others aware. Scammers often target the same sites.

Search your number online and report abuse.

Look for other listings of your phone number tied to scams to report the accounts. The more you can shut down the better.

Sign up for monitoring services.

A credit monitoring service can notify you anytime your personal information appears in new fraudulent applications for credit or services.

Implement a call screening app.

Apps like YouMail provide enhanced call screening and blocking to prevent scam calls from ringing your phone.

Consider changing your phone number.

If all else fails, changing your phone number will ensure a clean slate and prevent future misuse. But take preventative steps for the new number.

Continue to monitor account activity.

Keep a close eye on associated accounts and your credit reports for any signs of misuse stemming from the scam.

Frequently Asked Questions about the Google Voice Verification Code Scam

The Google Voice scam is complicated and raises many questions for affected users and those looking to protect themselves. Here are answers to some of the most frequently asked questions:

What is the Google Voice verification code scam?

The Google Voice scam is a type of phone number hijacking scheme. Scammers find your phone number listed online and trick you into giving them a verification code texted by Google. They use this code to create a Google Voice number linked to your phone number without your consent.

How do scammers get your verification code?

Scammers first find your phone number listed on a public website, ad, or social profile. They contact you posing as an interested buyer or follower. At some point during the conversation, they will ask you to relay a 6-digit verification code sent to your phone by Google. If you provide the code, you inadvertently help them finalize creation of a Google Voice account in your name.

Why do scammers want access to my number on Google Voice?

With a Google Voice number linked to your phone number, scammers can use it to anonymously conduct robocall scams, phishing schemes, identity theft, and various forms of fraud. Your number provides cover and makes it look like the scam communications are coming directly from you.

How did my number get on Google Voice without my permission?

Google allows multiple Google Voice accounts to verify the same forwarding phone number. So while you have your number tied to your own Google Voice account, scammers are able to verify the same number with fraudulent accounts unbeknownst to you.

Why would Google allow multiple accounts with the same number?

Google designed the system to allow users to recover access if they lose their account password and recovery information. Having another registered account with the same verified number provides a backdoor to restore access. However, this opens up exploitation opportunities for scammers.

Does providing the code give scammers access to my Google account?

No, they do not gain access to your personal Google account, only the new Google Voice account they are creating with your number. The scam just associates your number with their account.

Can I prevent my number from being added to other Google Voice accounts?

Unfortunately, there are no settings to limit your number to just your Google Voice account. Anyone can add it to a new account if they trick you into providing the verification code.

How can I remove my number from a scammer’s Google Voice account?

You need to report the fraudulent Google Voice account. Google’s security team is able to dissociate your number from accounts confirmed as abusive. However, you must continue monitoring for other potential accounts using your number fraudulently.

Does reporting a scam account completely resolve the problem?

Not necessarily. If your number was already verified on multiple scam accounts, removing it from one does not remove it from the others. It also may still be circulating on scam directories. So further monitoring and prevention is required.

How can I prevent my number from being misused on Google Voice?

  • Avoid posting your phone number publicly online when possible
  • Use alternate contact numbers like virtual phone lines when posting ads publicly
  • Be suspicious of any verification code requests and never provide the codes
  • Routinely search your phone number online to uncover any scam accounts
  • Report any fraud accounts or database listings using your number

What are the risks if my number is used on a scam Google Voice account?

  • Your number will forward scam calls & texts to you, damaging your reputation
  • You may become legally liable for fraudulent calls placed by the scammers
  • Scammers have cover to conduct identity theft and other fraud anonymously
  • Removing your number once compromised can be challenging

What should I do if my number is already hijacked?

  • Immediately report to Google Voice for investigation
  • Contact your carrier to block changes to call forwarding
  • Search online for other scam listings and report them
  • Monitor your credit and accounts closely for signs of identity theft
  • Consider changing your phone number as a last resort

How can I recover if my identity is stolen through this scam?

  • Get fraud alerts on your credit reports to monitor for unauthorized applications.
  • File an Identity Theft Report with the FTC at IdentityTheft.gov.
  • Contact companies where unauthorized accounts were opened in your name.
  • Reset all account passwords and security questions for protection.
  • Review all charges to financial accounts and report unauthorized ones to the company.

Hopefully these answers provide clarity on how the Google Voice verification scam works, how to avoid it, and what to do if you are targeted. Stay vigilant about any inbound requests for verification codes to protect your number.

The Bottom Line

In summary, the Google Voice verification scam presents a serious threat to anyone who displays a phone number publicly online.

Providing a single six-digit verification code to a scammer gives them the gateway to create a Google Voice account in your name and anonymously carry out fraudulent activity at scale. You may never hear from the original scammer again, but your number is now compromised.

Once your number is hijacked, calls and texts will forward to your phone from scam victims who believe they are contacting the real owner of the number. This can damage your reputation and lead to legal issues.

Meanwhile, the anonymous Google Voice account enables the scammer to engage in various forms of fraud like spam robocalls, phishing schemes, imposter scams, and identity theft.

The scam succeeds by taking advantage of unaware victims and Google’s multi-account allowance per number. It is essential to treat any unexpected verification code requests sent by Google with extreme caution.

Never provide these codes to an unverified source over the phone or text. Do not trust any pleas, emergencies, or other stories used to trick you into handing over the code.

If you have become the victim of a Google Voice scam, take steps immediately to disassociate your number from fraudulent accounts, report the abuse, and monitor your accounts closely for any potential misuse.

Be wary of publicly posting contact information online going forward. Scammers troll sites like Craigslist searching for potential targets. If necessary, only provide partial numbers or use throwaway VoIP numbers when listing on public forums.

Lastly, be vigilant about incoming communications from unknown sources asking for personal information or account access. The Google Voice scam is just one tactic fraudsters use to steal identities and monetize victims. Maintaining awareness of the latest scams is your best protection.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment