Telemarketers and Phishing attackers use different methods to trap users into their evil plans. To prevent themselves from being caught and pretend to be trustworthy, they need to be cautious to hide their original identity. For that, they use spoofing.