Scammed.
Author
Tristan Smith
Date Published

Inside the World of International Scam Call Centers and the Ethical Hackers Fighting Back
Disclaimer: This article examines criminal scam call centers that happen to operate from India. It does not imply that all Indian call-center work is fraudulent or that people from any region are inherently dishonest. The vast majority of call-center employees are legitimate workers; the criminals described here represent a tiny fraction of the industry, and just so happen to be the ones we watch daily.
A Hidden Industry Built on Fear and Deception

While not an actual shot from a real call center, they are tightly packed, archaic equipment - full of actual scammers, debtors with no choice and bosses who do no nothing. They are not hackers, they are scammers.
Imagine sitting at your kitchen table when the phone rings. The person on the other end of the line has your full name, address and partial Social Security number. They claim to be from the IRS and tell you that you owe back taxes. They warn that police officers are on their way to arrest you. Unless you pay right now, they will freeze your accounts and deport your family. It sounds like a crime thriller—but for thousands of victims, this is a terrifying reality.
An indictment unsealed in the United States described how one network of scam call-centers in Ahmedabad, India used information obtained from data brokers to call potential victims while impersonating officials from the IRS and U.S. Citizenship and Immigration Services. Operators threatened victims with arrest, imprisonment or deportation if they didn’t pay supposed tax penalties, then instructed them to purchase prepaid debit cards or wire transfers. A network of U.S.-based conspirators laundered the extorted funds by purchasing money orders and transferring them overseas. Some operators even used hawala networks to move money outside of formal banking channels.
The sums involved can be staggering. In one incident, scammers extorted US$12,300 from an 85-year-old Californian by threatening her with arrest; another victim in Hayward, California was tricked into buying 276 stored-value cards worth US$136,000. Similar call-centers run by different operators have used Social Security scams, claiming a victim’s number was linked to a crime, or loan scams that persuade victims to pay up-front “good-faith” deposits.
A Global Web of Robocalls

This is a global problem, and all agencies seem to turn a blind eye to it because of red tape
These operations are highly organized. A 2022 superseding indictment charged multiple call-centers and directors with forwarding tens of millions of scam calls to U.S. consumers through a voice-over-IP (VoIP) provider. The callers targeted vulnerable and elderly people, causing emotional and financial devastation. They impersonated federal agents, told victims their Social Security number was involved in crimes, threatened immediate arrest and demanded payment via wire transfers or gift cards. In the loan-fraud variation, scammers pretended to represent lenders, deposited fraudulent funds into victims’ accounts, then convinced them to withdraw and transfer money before the deposit bounced.
Scam call-centers are constantly evolving. In July 2025, Indian law enforcement working with the UK’s National Crime Agency (NCA), the FBI and Microsoft raided a call-center in Noida as part of Operation Chakra-V. The criminals had been sending pop-up scareware messages to computers in the UK, U.S. and Australia and then posing as Microsoft support technicians. Over 100 UK victims were identified and they collectively lost at least £390,000. Investigators noted that the scammers used spoofed phone numbers and VoIP calls routed through multiple countries to hide their location. The bust showed what can be achieved when law enforcement agencies across countries and private companies cooperate.
A Global Web of Robocalls

Myth 1: Government agencies call to demand immediate payment.
Truth: Federal agencies never threaten instant arrest or insist on gift cards, wire transfers, or cryptocurrency. Real agencies communicate through official letters and provide time to appeal. If someone demands secrecy, urgency, or unconventional payments, it’s a scam. The odds of you receiving such a “government” call are high, because scammers blanket entire area codes with robocalls, hoping even a tiny percentage will believe them.
Myth 2: If someone knows your personal details, they must be legitimate.
Truth: Scammers often purchase stolen information from data brokers or data breaches. Your name, address, or even Social Security number might already be circulating on the dark web. Having your details doesn’t prove the caller is authentic—it only means your data has been compromised at some point. With billions of records leaked worldwide, nearly everyone is a potential target.
Myth 3: Only the elderly or “gullible” get scammed.
Truth: While older adults are targeted more frequently because they may have retirement savings or less familiarity with technology, scammers tailor their scripts for everyone. Younger people get hit with student loan relief scams, fake job offers, or phishing texts. Even tech-savvy individuals can fall for realistic pop-ups that mimic Microsoft or Apple warnings. In truth, if you own a phone or an email account, your odds of being targeted are almost certain—it’s not about gullibility, it’s about timing and pressure.
Myth 4: A refund or loan deposit in your account proves the caller is real.
Truth: Loan-fraud and refund schemes create the illusion of legitimacy by putting temporary credits or fake deposits in your account. Once you send money back, the original “deposit” vanishes, leaving you on the hook. This trick works because seeing money appear in your account feels convincing—but in reality, it’s just a banking sleight of hand. With millions of fake refund calls placed every week, chances are high you’ll eventually receive one if you haven’t already.
How Ethical Hackers and the Blue Teams Fight Back

an anonymous man hacks away at the justice he sees that needs his help.
A growing community of ethical hackers—also called scambaiters—has dedicated itself to exposing criminal call-center operations. Unlike the scammers, these hackers use their skills not to steal, but to collect evidence, document operations, and pass actionable intelligence to authorities. Their toolbox has grown to include both simple tricks and sophisticated techniques:
Virtual machines and sandboxing
Scambaiters typically interact with scammers inside isolated virtual machines (VMware, VirtualBox, or Hyper-V). This ensures that even if malware is dropped, it can’t spread to their real system. Many configure multiple snapshots so they can roll back instantly, record every keystroke, and even capture full network traffic with tools like Wireshark or tcpdump.
Reverse remote-access exploits
When scammers trick victims into installing remote desktop software (like AnyDesk, TeamViewer, or LogMeIn), ethical hackers deliberately allow the connection inside a sandbox. Misconfigurations or default passwords sometimes let them establish reverse sessions into the scammer’s own machine. Once in, they can grab call scripts, victim lists, or internal chat logs. In some cases, they’ve viewed CCTV feeds inside the scam office, giving investigators a live look at the operators.
Caller-ID and VoIP analysis
Because scams rely heavily on spoofed phone numbers, scambaiters analyze SIP headers and VoIP metadata to trace the origin of calls. Using Asterisk servers, softswitches, and partnerships with telecom engineers, they can often follow the trail back to the SIP gateways or hosting providers that scammers use. Mapping these pathways helps authorities identify the physical call-center.
OSINT (Open-Source Intelligence)
Hackers combine technical captures with OSINT work: scanning LinkedIn for suspicious job ads (“customer support executives”), scraping corporate registries for shell companies, and mining Facebook or Instagram for operators bragging about “tech support” jobs. Tools like Maltego, SpiderFoot, or even custom Python scrapers are used to link real names, addresses, and financial accounts to the fraudulent operations.
Hardware tricks
Some scambaiters set up Raspberry Pi honeypots or low-power bait machines on dedicated networks to run 24/7, waiting for scammers to connect. Others use USB protocol analyzers or even Flipper Zero-style devices to log keystrokes or signals when scammers attempt to deploy malicious USB payloads. By intentionally allowing these connections in a safe environment, hackers gather intelligence without risk.
Network and malware analysis
If a scammer drops malicious files, ethical hackers run them inside a sandbox environment like Cuckoo Sandbox or analyze them with IDA Pro or Ghidra. This reveals the infrastructure the malware phones home to—servers, domains, and IP addresses—which can then be reported and taken down.
Data sharing with authorities
Perhaps the most important step: once evidence is gathered, scambaiters securely package logs, screenshots, and forensic data for agencies such as the FTC, FBI, or international law enforcement. Coordinated takedowns are only possible when private individuals and official investigators share intelligence.
A Possibly Fictional Infiltration Story - The Rush of a First Ethical Hack

Hack the Planet friend.
The following narrative is inspired by real scam-baiting tactics but does not describe any specific individual or case, for obvious reasons per our legal friends. I must insist no one follow this but at your own risk.
The initial hook:
It began with a pop-up on an old laptop screaming that the system was infected. Our ethical-hacker team, working under a pseudonym, dialed the number displayed. A polite voice with a faint accent greeted us, introducing himself as a technician from “Premium Support.” His script was smooth, calculated to lower our guard. What he didn’t know was that the laptop he was about to touch wasn’t real—it was a heavily monitored virtual machine waiting for him.
Setting the trap:
We played along and installed the remote-control software he demanded. As soon as the scammer moved his mouse across our screen, hidden monitors lit up. Our instrumentation quietly captured his IP address, remote-access session ID, keystrokes, and file movements. While he thought he was in charge, we leveraged the connection to establish a reverse shell back into his environment. This allowed us to see his system clock, file directories, and even internal chat windows, all while he remained blissfully unaware.
Peeking behind the curtain:
Then came the breakthrough—a window into their own CCTV system. The feed revealed a cramped office packed with rows of young operators, each with a headset clamped to their ears. Whiteboards scrawled with “IRS Script,” “SSA Threat,” and “Tech Support Pop-Up” hung on the walls. On one screen, we saw massive spreadsheets loaded with thousands of names, addresses, and phone numbers—victims spread across the U.S., UK, and Australia. For us, the emotional weight was real: every cell on those sheets represented someone about to be terrified or robbed.
Turning data into evidence:
We captured everything: packet logs, screenshots, and recordings of live calls. Using OSINT techniques, we cross-referenced the directors’ names with LinkedIn profiles, scraped local business registries, and pieced together a corporate paper trail. Their office address matched a business park in Noida, India. Layer by layer, the scam operation’s mask slipped away. The adrenaline was high, but so was the responsibility—we were building a case that could either crumble or bring down an entire criminal network.
The takedown:
Weeks later, the moment of truth arrived. News broke: police, aided by international cybercrime units, had stormed the office. Computers were seized, call scripts confiscated, and the ringleaders led out in handcuffs. Victims’ data was secured before it could be sold off or abused further. Reading those headlines, our team felt an overwhelming mix of triumph and relief. The late nights of digging through logs, the tension of watching scammers prey on the vulnerable in real time—it all culminated in justice. Knowing that frightened grandparents, isolated students, and struggling families had been spared future calls filled us with pride. For once, the shadows these scammers thrived in had been turned against them.
This event leaves goosebumps on my arms, such a win - with such a price.
Staying Safe: Practical Advice

They run, but there is always someone faster and better than them
A growing community of ethical hackers—also called scambaiters—has dedicated itself to exposing criminal call-center operations. Unlike the scammers, these hackers use their skills not to steal, but to collect evidence, document operations, and pass actionable intelligence to authorities. Their toolbox has grown to include both simple tricks and sophisticated techniques:
Virtual machines and sandboxing
Scambaiters typically interact with scammers inside isolated virtual machines (VMware, VirtualBox, or Hyper-V). This ensures that even if malware is dropped, it can’t spread to their real system. Many configure multiple snapshots so they can roll back instantly, record every keystroke, and even capture full network traffic with tools like Wireshark or tcpdump.
Reverse remote-access exploits
When scammers trick victims into installing remote desktop software (like AnyDesk, TeamViewer, or LogMeIn), ethical hackers deliberately allow the connection inside a sandbox. Misconfigurations or default passwords sometimes let them establish reverse sessions into the scammer’s own machine. Once in, they can grab call scripts, victim lists, or internal chat logs. In some cases, they’ve viewed CCTV feeds inside the scam office, giviStaying safe: practical advice
The call-center cases above highlight what to watch for and how to respond. And remember—these calls don’t just happen in big cities. Even here in the Lehigh Valley, residents pick up the phone and hear the same IRS threats, the same tech-support pop-ups, the same promises of fake refunds. No corner is untouched when the internet makes every number local.
Do not trust unsolicited calls demanding money.
Hang up immediately. Government agencies will never threaten arrest or demand gift cards, wire transfers, or cryptocurrency. If you’re concerned, use the official phone number listed on their website—never the one a caller gives you.
Be skeptical of pop-up warnings.
Fake system alerts are designed to panic you into dialing a number. Microsoft, Apple, or your phone manufacturer will never put their support lines inside an error box. If a screen pushes you toward a phone call or remote-access tool, it’s a scam.
Use call-blocking and spam-filtering tools.
Most carriers now provide free or low-cost apps that filter suspected robocalls. Pair those with built-in smartphone spam filters. Nothing will stop all scams, but each filter lowers the chance that you’ll pick up a convincing one by accident.
Report scams.
Reporting helps investigators spot trends and coordinate takedowns. Every report is another breadcrumb for the bigger case. Think of it as contributing a single puzzle piece toward the larger picture of dismantling these networks.
Keep a record of who scammers do business with.
When you identify the companies they use—gift-card brands, payment processors, or VoIP providers—write them down. If necessary, contact those businesses directly to warn them their services are being abused. Many providers will cut ties when presented with clear evidence.
Lean on your manufacturer’s support.
Whether it’s Apple, Samsung, or Google, device makers offer direct customer-support channels. Use them when in doubt. If something looks suspicious on your phone, tablet, or computer, it’s far safer to reach out through your manufacturer’s official support site than to trust a pop-up or an unknown caller.
Other practical hints.
Use password managers to reduce the fallout if one of your accounts is phished.
Enable multi-factor authentication so a stolen password isn’t enough.
Train family members—especially kids and older relatives—on how to recognize a scam script.ng investigators a live look at the operators.
Know that out of 9 billion leaked passwords - only 3% are unique. Change your passwords!
Conclusion
For the everyday person, the defense is simpler: stay aware, stay skeptical, and stay connected. Use the support channels that come built into your devices—your phone manufacturer, your computer maker, your service provider all have legitimate hotlines and portals. Trust them before you trust a stranger. Record what happens, share it, and don’t be afraid to raise your voice when something feels off. Scammers rely on silence; breaking that silence weakens them.
And we don’t want you to face this fight alone. Join us at local events we host throughout the Valley—community nights where we teach families how to recognize scam tactics, demonstrate the tools we use to track the scammers, and share practical steps to live more confidently online. It’s about being prepared, informed, and worry-free. Together, we can turn the tide, not just by avoiding scams ourselves, but by making sure our neighbors, parents, and children know how to spot them too.
Because the truth is: they can only thrive if we stay afraid. And we don’t stay afraid for long, as we are watching - constantly.