Online scams are getting slicker by the day. As we get better at protecting our data and spotting red flags, scammers sharpen their tactics right alongside us. One of the tools that’s become surprisingly popular in their toolbox? Google Voice.
Google Voice gives you a phone number you can use to call, text, and send voicemail—basically, a second number that runs through the internet instead of your cell plan.
It can be useful for people who want to keep their personal number private, manage calls more easily, or separate business from personal communication. But that convenience is also exactly what makes it appealing to scammers.
Here’s how scammers exploit it and what you can do to protect yourself.
Google Voice: What it is and how it works?
Google account users can choose a free phone number from nearly any U.S. area code. This number allows you to make and receive calls or texts over Wi-Fi or mobile data, without ever sharing your personal cell or home number.
Search for people data on 
Find People online, lookup contact info, phone numbers, emails and more!
It’s handy for freelancers juggling clients, small business owners setting up a basic phone system, or even just people who want a number they can hand out without giving away their main line. The problem is, scammers have also realized how easy it is to create (and discard) Google Voice numbers to stay anonymous while running their schemes.
How scammers exploit Google Voice
Anonymity and easy setup
Setting up a Google Voice number is quite easy. Creating an account requires only a Google login and an existing phone number for verification. This minimal barrier to entry means scammers can quickly create new, disposable phone numbers within minutes. If one number is flagged or blocked, they can simply make another.
Google does not require thorough identity verification for basic account creation, allowing bad actors to operate under fake names and details. For non-U.S.-based scammers, these numbers create a “virtual presence” in the U.S., making their calls appear local and trustworthy—a tactic that can lower victims’ suspicions.
Geographic masking
Scammers can select their phone numbers’ area code, so their calls appear to come from a specific region. For example, a scammer targeting Texas residents could choose a Houston area code, making their offer, threat, or plea seem more credible. People are more inclined to answer or trust calls that appear to come from a local or recognizable number.
Call and text spoofing
With Google Voice, scammers can mask their true phone number and identity. By using the platform’s call forwarding and texting capabilities, they can reach a wide audience while protecting their real location and phone number from exposure.
This makes it extremely difficult for investigators, victims, and phone carriers to track the scammer’s identity or shut them down.
Automated and large-scale fraud campaigns
Since new Google Voice numbers can be created quickly and for free, scammers are able to launch “shotgun” campaigns: robocalls, mass text phishing, and broad attempts to solicit personal information, all conducted with relative anonymity and without fear of losing costly accounts. Tools and scripts can automate much of this scam activity, increasing the scale and reach.
Bypassing traditional phone carriers
Traditional phone carriers maintain stricter identification and tracing protocols. Google Voice falls outside typical telecom oversight, making fraudulent accounts less likely to attract immediate attention and easier to create in bulk.
Lack of robust upfront identity verification
Unlike a mobile phone contract or a landline, there’s no requirement to provide proof of identification, address, or even legitimate billing information. For scammers seeking to remain anonymous and generate multiple accounts, this is ideal.
The Google Voice verification code scam
One of the most well-known schemes linked to Google Voice numbers is the Google Voice verification code scam.
Search for people data on 
Find People online, lookup contact info, phone numbers, emails and more!
How the scam works
1. Finding a victim: Scammers comb online platforms (Craigslist, Facebook Marketplace, Nextdoor, classified ad sites) for phone numbers of people selling goods, searching for pets, or requesting services.
2. Making contact: The scammer poses as an interested buyer, helpful stranger, or authority figure. After some initial communication, they’ll ask to verify your identity for “security”—a tactic to build trust.
3. Requesting the verification code: The scammer prompts Google Voice to send a six-digit verification code to your phone. They then request that you send them this code “to prove you are real.”
4. Taking over a Google Voice number: Once you share the code, the scammer uses it to register a Google Voice account linked to your phone number, without your knowledge.
5. Exploiting your phone number: With this new Google Voice account, the scammer can impersonate you, commit further fraud using your identity, or layer additional scams using your “trusted” phone number. Victims only realize what happened when their number is flagged, their real number is frozen by Google, or law enforcement comes knocking.
Consequences for victims
- Loss of control: Once your number is linked to the scammer’s Google Voice, you may lose access and experience trouble reclaiming it.
- Being impersonated: The scammer can send texts, make calls, or post online as though they are you, damaging your reputation or defrauding others using your identity.
- Further fraud: In some cases, the scammer sells your compromised information on the dark web.
- Time and stress: Victims often have to deal with Google support, report fraud, and monitor future identity theft.
How to spot and avoid Google Voice scams
Awareness is the first step towards protection. Here’s how to recognize and sidestep these scams.
Red flags
Requests for verification codes: Any unsolicited request for a six-digit Google verification code, especially if you’re communicating with a stranger, is a major warning sign.
Local area codes from unknown numbers: Be wary if a new “local” number texts or calls with strange requests or urgent stories.
Urgency or threats: Scammers often add pressure: “Act now or lose your account/money/opportunity!”
Contact via anonymous platforms: Legitimate businesses and employers use traceable phone numbers and emails.
How to protect yourself
1. Never share verification codes
Never give your Google verification code (or any other security code) to anyone, even if they seem credible.
2. Verify, then trust
If someone asks you to “verify yourself,” use another method (a video call, in-person meeting, or another public channel) before giving any information.
3. Check the phone number
Use a reverse phone number lookup tool, such as BeenVerified, to try and investigate unfamiliar numbers before responding.
4. Report suspicious activity
If you receive a suspicious message or call, report it to the FTC, your state attorney general, and the platform (Craigslist, Facebook, etc.) where it occurred.
5. Educate others
Warn friends, family, and online community members about the Google Voice scam.
What to do if you’ve been victimized
Regain control of your number
Google provides instructions for reclaiming any Google Voice number associated with your phone without your authorization. Steps typically include:
- Visit the Google Voice help page
- Use your real phone number to sign in and request reinstatement
- Follow the prompts to delete any unauthorized Google Voice accounts using your number
Report the incident
- FTC: File a complaint at reportfraud.ftc.gov
- Local law enforcement: File a police report when identity theft is suspected.
- Platforms involved: Notify Craigslist, Facebook, etc., if the scam occurred via their services.
Monitor for further fraud
- Credit reports: Regularly check your credit with all three bureaus.
- Bank accounts and social media: Set up alerts for suspicious logins or transactions.
- Email accounts: Log out of all sessions and reset passwords frequently.
How BeenVerified can help
If you’re concerned about who’s really behind a phone number, online profile, or suspicious call, BeenVerified can be a valuable resource for safeguarding yourself and your loved ones.
With a BeenVerified subscription, you have access to eight background research products for the price of one:
- People Search: Uncover more about the individuals contacting you.
- Vehicle Search: Look up vehicle history and ownership.
- Phone Search: Investigate suspicious or unknown phone numbers.
- Address Search: Verify property ownership and rental legitimacy.
- Email Search: Check if an email address is linked to scams or fraudulent activity.
- Social Media Search: Discover hidden profiles or online usernames.
- Unclaimed Money Search: See if you’re owed forgotten refunds or payouts.
- Business Search: Research businesses to spot fake companies or job scams.
Whether you’re trying to verify the identity of a potential scammer, buyer, renter, romantic interest, or anyone else reaching out online, BeenVerified gives you the power to search securely and thoroughly. Don’t leave your personal safety or resources to chance—arm yourself with knowledge before engaging further.