Lost money to a scam that impersonated someone you trust?

You may be a victim of a spoofing scam. Our award-winning solicitors can help recover your lost funds with our proven recovery process.

Spoofing Scams Explained

How do spoofing scams work?

  • magnifying-glass

    What is spoofing?

    A spoofing scam is when a scammer pretends to be someone else to obtain sensitive information or money. Some of the most common strategies are through email, caller ID, website, text message, and social media.

  • bank

    Impersonation tactics

    Impersonation tactics trick you into believing you’re speaking with a trusted source, such as a friend or an organisation. In most cases, the scammer’s communication will be almost identical to the messages you’d normally receive, with just one letter, number, or symbol changed.

  • globe

    Social engineering

    Social engineering is where a scammer manipulates their victim by playing on their vulnerabilities, such as fear or a lack of knowledge. For example, a scammer calls you and pretends to be from your bank. To get your sensitive info, they say they need access to your account as unusual activity has been detected.

Types of spoofing scams

Email spoofing scams

Scammers forge email headers, so it looks like the message is from someone you trust. This tricks victims into clicking malicious links, downloading malware, or sharing sensitive information.

Start your claim
WRS team

Caller ID spoofing

A call appears to come from a trusted number, such as your bank or delivery service. It may prompt you to click a link or act urgently. Many victims follow the instructions, only to be redirected to a fake site that’s designed to steal sensitive information or money.

Two female WRS solicitors working together on document

Website and DNS spoofing

These spoofing scams mimic trusted platforms, for example, the websites of banks or energy providers. Victims enter their details into these look-a-like platforms, which scammers then use to access their accounts or install malware on their devices.

Start your claim
WRS solicitor working in office

Why WRS?

Supporting you is our priority. That’s why we provide personalised plans and care around the clock to our clients.

Trusted by thousands

Join satisfied clients who’ve recovered their lost funds with WRS.

The WRS senior team

Call on us for guidance and support 

Falling victim to fraud can be overwhelming and distressing. You deserve expert guidance and support every step of the way. That’s what we’re here for.  

Request a callback

Request a Callback

"*" indicates required fields

Please enter your full name.
This should be the amount you initially invested.
Email must include '@' and a domain, such as 'example.com'.
Please briefly explain the circumstances and how we can help you.
Please enter a valid phone number.
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
Start your claim

Spoofing Scam FAQs

  • What is the difference between spoofing and phishing?

    Phishing is a broad term for a scam that tricks victims into revealing sensitive information by impersonating a trusted entity. Spoofing scams, however, are a specific technique used to disguise the origin of a message, so that it appears to be from a trusted source. For example, the email address might be changed by one letter to make you believe the email you receive is from a close family member.

  • Are spoofing scams illegal?

    Spoofing scams are illegal when used to commit fraud or deceive victims. While UK law doesn’t have a standalone offence called “spoofing,” these scams are often prosecuted under broader laws around fraud, telecommunications offences, and cybercrime.

    Although enforcement can be challenging, that doesn’t mean you’re powerless. If you believe you’ve been targeted by a spoofing scam, get in touch for a free consultation with one of our supportive solicitors. We may be able to help you recover lost funds and build a case against those responsible. 

  • What should I do if my phone is attacked by a spoofing scam?

    If scammers are using your number to make fraudulent calls or texts, you can take the following steps to protect yourself: 

    • Tell your mobile carrier: Contact your provider and explain the situation as soon as possible.  
    • Increase your call security settings: Use your phone’s built-in options to block withheld or unknown numbers, silence unknown callers, or enable spam protection features. 
    • Set or change your voicemail password: Spoofers may try to access your voicemail. Make sure it’s protected with a strong PIN, not the default setting. 
    • Create a new voice message: Update your voicemail greeting to let real callers know your number is being spoofed and to ignore suspicious messages from it. 
    • Give it time: Most spoofing attacks are short-lived. Scammers usually move on after a few days or weeks if they don’t get responses, so there’s a good chance the spoofing won’t last.  
    • Check your phone bill: Spoofing doesn’t usually involve unauthorised use of your account, but it’s worth reviewing your bill for unexpected charges or calls. 
    • File a complaint: Filing a complaint helps bring awareness to the issue for future victims and can also offer important documentation in case you need to recover funds from the scam.  
    • Get a new phone number: If spoofing continues to cause disruption, ask your provider about changing your number. It’s a last resort, but it can resolve the issue for you. 
    • Read our iSpoof article: Our guide on the iSpoof fraud case offers more details on how scams like this work. It also explains how WRS can help you reclaim the money you’ve lost with our proven recovery process.  
  • Is spoofing the same as being hacked?

    No, spoofing isn’t the same as being hacked. Spoofing is when someone pretends to be someone or something else in a communication, such as an email, phone call, or website. The goal is usually to trick you into revealing information that benefits the scammer.  

    While spoofing aims to deceive you into handing over information, hacking is more direct. It involves a fraudster gaining authorised access to your system, device, or account, typically to steal data or install malware.