In high-stakes telecommunications, even a three-digit prefix can carry more than just a geographic origin—it can signal risk. Area code 646, once associated with a legitimate telecom provider in South Korea, has recently infiltrated Mexican phone networks as part of a sophisticated scam infrastructure. First noticed by local cybersecurity teams in early 2024, this number now appears in thousands of outgoing calls from unsolicited sources, often targeting elderly victims and business professionals alike.

Understanding the Context

The danger lies not in the code itself, but in the layered deception masked by its familiarity.

The Hidden Mechanics of Score Number Scams

What makes 646 particularly insidious is its exploitative use of a globally recognized prefix—Area code 646—originally assigned to KT Corporation, South Korea’s leading telecom operator. Scammers repurpose such prefixes not through technical fraud, but through social engineering. They embed 646 into robocalls, SMS alerts, and direct voice messages designed to mimic trusted entities: banks, government agencies, or well-known tech platforms. The familiarity of the code lowers suspicion, creating a false sense of legitimacy that bypasses standard call verification.

This tactic reflects a broader evolution in international scam operations: moving beyond spoofed local numbers to hijack globally recognized prefixes.

Recommended for you

Key Insights

Unlike traditional spoofing, which relies on faked caller IDs, using 646 leverages genuine telecom infrastructure—making detection harder. As one Mexican telecom analyst noted, “It’s not about tricking the system; it’s about tricking trust. When you hear 646, your brain registers it as safe—even when it’s not.”

How It Works: The Call Chain from Scam to Victim

Here’s the sequence: scammers acquire compromised or newly registered numbers in high-traffic zones, including those tagged 646. These numbers route through VoIP networks—cheaper, less-regulated channels—enabling rapid, global call deployment. Automated scripts then deliver pre-recorded messages: “Your account is locked,” “Pay $50 now,” or “Urgent government notice.” These are not spontaneous; they’re timed, often peaking during evening hours when targets are home alone.

Final Thoughts

Victims receive calls demanding immediate action—transferring funds, confirming personal data, or activating ‘security features.’ The pressure is psychological, designed to bypass rational judgment. In many cases, the caller uses urgent, authoritative language—simulating officials from banks or tech firms. This mimicry, combined with the trusted prefix, makes refusal feel reckless.

Real-World Impact: Who’s Being Targeted?

Data from Mexico’s National Institute of Statistics (INEGI), cross-referenced with cybersecurity reports, reveals that over 68% of reported 646-linked calls target adults over 55, particularly in urban centers like Mexico City and Guadalajara. Businesses also suffer: 23% of call logs from corporate lines include calls from 646 numbers, often posing as IT support or financial auditors.

A 2024 case study from a Tijuana-based SME showed how a single call from 646—posing as a “national tax authority”—led to a $12,000 fraud after the target transferred funds to a foreign account. No device was hacked.

The vulnerability was the number itself.

Why This Scam Thrives: Psychology Meets Infrastructure

The 646 scam operates at the intersection of trust and technological accessibility. In Mexico, mobile penetration exceeds 120 million subscriptions, with 85% of users accepting unsolicited calls without verification. Scammers exploit this by repurposing legitimate prefixes—numbers that should signal safety but now trigger fear.

Moreover, the global telecom ecosystem enables rapid deployment.