https://blog.malwarebytes.com/social...all-forwarding
The methods consists of several steps and it takes some social engineering skills, but it’s good to be aware of the possibility and how it works. It starts with the threat actor reaching out to a victim and convincing them to call a specific number.

Call forwarding

The number the threat actor will try to convince you to call is not always the same, but most of the times it will look like this **67*<10 digit number> or *405*<10 digit number>.
Someone tried this on me a few weeks ago. I just ignored and deleted it as I would any calls I don't recognize but it helps to know what they were trying to do.