In 2025, U.S. consumers were barraged with an astonishing 52.5 billion robocalls, according to the YouMail Robocall Index. December alone accounted for just under 4.1 billion calls, highlighting how pervasive this threat remains entering 2026.
While consumers often treat robocalls as a nuisance, the scale and sophistication of today's automated calling campaigns present distinct cybersecurity risks that overlap with fraud, data theft, identity compromise, and social engineering—making calls far more than just an annoyance.
According to a press release, total robocall volume in 2025 was essentially flat compared with 2024 at 52.5 billion versus 52.8 billion, and annual totals have consistently ranged from 50 to 55 billion over the past five years.
Monthly trends throughout 2025 underscore the persistence:
-
April 2025 saw a spike at nearly 5 billion robocalls, the highest since mid-2023.
-
Summer and early fall volumes hovered above 4 billion calls per month, with modest fluctuations.
-
October and November experienced month-over-month declines (reflecting short-term variability) but still remained near multi-billion levels.
-
By December, volumes climbed back to more than 4.1 billion, a 6.4% increase from November 2025.
The YouMail Robocall Index aggregates traffic patterns attempting to reach millions of active users and serves as a reliable indicator of broader industry call volume and trends.
Robocalls are often dismissed as a consumer telecom problem, but modern campaigns increasingly intersect with cybersecurity and fraud risk in several ways.
1. Social engineering and phishing via voice (vishing)
Robocalls are used for voice phishing (vishing) to harvest credentials, direct victims to malicious websites, or extract personal data under false pretenses. Attackers can impersonate banks, government agencies, or trusted brands and use scripted interactive voice responses to create a false sense of legitimacy. The sheer volume of robocalls amplifies these risks.
2. Fraud and account takeovers
Some robocall campaigns direct victims to call back or enter responses that lead to fraudulent transfers, verification scams, or unauthorized access to accounts. The high volume increases the probability that some targets will engage, making these campaigns effective for criminals.
3. Identity theft and data exposure
Repeated unsolicited calls can provide attackers with incremental information about targets—even when victims hang up—that can be used to tailor future attacks or improve social engineering success.
4. Automation and scale signal capability
The infrastructure required to generate billions of automated calls monthly shows a level of automation and scale that also fuels other cybercrime—including automated credential stuffing, botnets, and malicious voice spoofing.
All told, these automated calls simulate a distributed attack against consumers, and many of the techniques used (identity spoofing, fraudulent callback numbers, AI-generated voice) mirror evolving trends in broader cybersecurity threats.
Scam and telemarketing calls still dominate
In December 2025, scam and telemarketing calls—categories that consumers generally most want to avoid—accounted for roughly 2.3 billion calls, about 56% of all robocall volume that month.
Even when overall monthly totals fluctuate, scam-oriented calls consistently represent the largest share of unwanted traffic—a pattern mirrored throughout the year. External trend analysis through September 2025 found that scam calls continued to grow and remained a dominant component of total robocalls.
Robocall trends in 2025 highlight a few important dynamics:
-
High volatility month to month: April 2025 spiked to about 5 billion calls, while later months saw modest declines—suggesting seasonal or strategic botnet behavior rather than steady linear growth.
-
Scam traffic can rise even when total volume drops: Scam robocalls were trending upward over mid-to-late 2025 even as total calls dipped slightly in some months—reinforcing that cybercrime vectors adapt rapidly.
-
Geographic focus varies: Some states, like Texas, have received disproportionately high volumes of robocalls this year, underscoring the need for regional threat intelligence tied to telecom patterns.
There are several steps cybersecurity professionals can take to keep robocalls, or at least the consequences of them, at bay.
1. Expand threat monitoring beyond digital channels
Traditional cybersecurity monitoring focuses on network, endpoint, and application layers. But automated voice fraud campaigns should be integrated into fraud risk dashboards, especially for organizations that process sensitive customer interactions or financial transactions.
2. Collaborate with telecom partners and carriers
Carrier-level analytics (e.g., STIR/SHAKEN call authentication) and robocall mitigation tools can help block or flag suspicious calling patterns. Security teams should ensure that voice authentication and anti-spoofing technologies are deployed and monitored.
3. Educate users and customers on voice threats
Internal users, customers, and remote or hybrid workers should be trained to identify and report vishing attempts. Incident reporting workflows should include voice attack scenarios.
4. Integrate telephony threat intelligence into incident response
Security operations centers (SOCs) and security event management should incorporate voice fraud signals—especially when correlated with phishing, SMS spam, or account takeover attempts—to identify coordinated campaigns.
5. Advocate for regulatory compliance and anti-fraud tools
Cybersecurity leaders can push for deployment of regulatory and industry standards (like caller ID authentication and traceback initiatives) within their organizations and customer bases.
The data show that automated calling campaigns remain a persistent, adaptive, and high-volume threat vector for individuals and organizations alike.

