Callback Phishing (TOAD)
Instead of malicious links, attackers provide phone numbers for victims to call; human operators then guide victims to install malware or transfer money.
MITRE ATT&CK: T1566.001Timeline: The Cat and Mouse
2021 β Attack emerges β 2022 β Goes mainstream β 2023 β Detection improves β Present
The Evolution
| Phase | Period | What Happened |
|---|---|---|
| ATTACK | Mar 2021 | BazarCall campaign pioneers callback phishing at scale |
| ADOPTION | 2021-2022 | Ransomware groups (Conti, Royal) adopt technique |
| PEAK | 2022 | Widespread use; combines email phishing with vishing |
| RESPONSE | 2022 | Phone number reputation databases emerge |
| Β | 2023 | SEGs add pattern detection for subscription/charge lures |
| CURRENT | Present | Still highly effective; human element hard to defend |
Key Events with Sources
| Date | Event | Significance | Source |
|---|---|---|---|
| Mar 2021 | BazarCall emerges | First large-scale callback phishing operation | Proofpoint |
| 2021 | Conti adopts technique | Ransomware operators use callback for initial access | AdvIntel |
| 2022 | Luna Moth campaign | BEC-focused callback phishing steals millions | Unit42 |
| 2022 | Phone reputation services | SEGs begin checking numbers against fraud databases | Proofpoint |
| 2023 | Pattern detection | Email security flags subscription/charge + phone patterns | Cofense |
Overview
Callback phishing (also called TOAD - Telephone-Oriented Attack Delivery) flips the traditional phishing model. Instead of sending malicious links or attachments, attackers send emails with phone numbers. When victims call, live operators use social engineering to guide them through malware installation or financial fraud.
The Attack
How It Works
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β EMAIL β
β β
β Subject: Subscription Renewal - $399.99 β
β β
β Your annual subscription to Premium Security Suite β
β has been renewed for $399.99. β
β β
β If you did not authorize this charge, call us at: β
β 1-888-XXX-XXXX within 24 hours for a full refund. β
β β
β [No links, no attachments] β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β
βΌ
Victim calls number
β
βΌ
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β CALL CENTER (Attacker-Operated) β
β β
β "To process your refund, I need to connect to your β
β computer to verify the transaction. Please go to β
β support-teamviewer.com and enter session ID..." β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β
βΌ
Attacker has remote access to victim's computer
β
βΌ
Malware installed, data stolen, or fraud executed
Why It Bypasses Security
No Malicious Content:
- No links to scan
- No attachments to analyze
- No URLs to reputation check
- Email is just text
Human-Driven:
- Live operator adapts in real-time
- Can overcome objections
- Builds rapport and trust
- Guides victim through security warnings
Authority + Urgency:
- Fake charge creates alarm
- Time limit creates pressure
- βRefundβ motivates action
- Professional call center appearance
Common Lures
Subscription Charges:
Norton LifeLock: $499.99
McAfee Antivirus: $399.99
GeekSquad: $349.99
Amazon Prime: $139.99
Order Confirmations:
"Your order for MacBook Pro ($2,499) is confirmed"
"iPhone 15 Pro shipping to [address]"
Account Alerts:
"Suspicious login detected - call to verify"
"Your account will be closed - call to prevent"
The Call Center
Attackers operate actual call centers:
- Often offshore locations
- Trained operators with scripts
- Multiple operators for volume
- Technical knowledge to guide victims
Typical Script:
- Verify caller identity (builds trust)
- Express concern about the βfraudβ
- Offer immediate refund
- Require remote access to βprocess refundβ
- Once connected: install malware, steal data, or transfer funds
Malware Delivery Path
1. Victim grants remote access (TeamViewer, AnyDesk, etc.)
2. Operator "checks" computer
3. Opens browser, downloads malware
4. Executes with victim watching (disguised as "scanner" or "removal tool")
5. BazarLoader, IcedID, or similar malware installed
6. Later: Ransomware deployment
Financial Fraud Path
1. Victim grants remote access
2. Operator opens banking site
3. Asks victim to log in
4. "Accidentally" transfers too much as "refund"
5. Asks victim to wire back the difference
6. Victim sends real money; "refund" was fake/reversed
Defenses
Email Detection
SEGs can flag:
- Phone numbers in emails from unknown senders
- Subscription/charge language + contact number
- Numbers matching known fraud databases
- Patterns indicating callback phishing
Phone Number Reputation
Databases track:
- Numbers used in fraud
- Temporary/VoIP numbers
- International numbers with fraud history
User Training
Critical training points:
- Legitimate companies donβt ask for remote access for refunds
- Never call numbers from suspicious emails
- Use official contact methods from known sources
- Hang up and call official number if uncertain
Remote Access Controls
- Block unauthorized remote access tools
- Alert on remote access tool installation
- Require approval for remote sessions
Attacker Adaptation
Multiple Phone Numbers
Rotate numbers to avoid reputation:
Call 1-888-111-XXXX or 1-888-222-XXXX
Legitimate-Seeming Numbers
- US toll-free numbers (1-800, 1-888)
- Local area codes
- βOfficial-lookingβ formats
Callback Scheduling
"We're experiencing high volume. Leave your number
and we'll call you back within 2 hours."
Attacker calls victimβharder to verify legitimacy.
Legitimate Platform Abuse
Use real support chat/callback features:
- Compromise vendor support accounts
- Use legitimate scheduling systems
- Harder to distinguish from real support
Current State
Status: Active
Callback phishing is highly effective:
| Why It Works | Defensive Challenges |
|---|---|
| No technical indicators | Hard to scan phone numbers |
| Human operators adapt | Canβt automate defense |
| Creates urgency/fear | Emotional manipulation works |
| Victims self-select | Those who call are engaged |
Detection Guidance
Email Indicators
Flag emails with:
- Phone numbers + charge/subscription theme
- Urgency + contact request
- No links/attachments (unusual for notifications)
- Slightly off branding
User Reports
Encourage reporting:
- Unexpected subscription emails
- Requests to call unfamiliar numbers
- Anyone asking for remote access
Endpoint Monitoring
Watch for:
- Remote access tool installation
- Remote sessions from unknown IPs
- Browser navigation to remote access sites
SIEM Correlation
email.body CONTAINS phone_number
AND email.body MATCHES (subscription|charge|renewal|refund)
AND email.links.count = 0
AND email.attachments.count = 0
What Killed It (or Weakened It)
| Defense | Introduced | Impact |
|---|---|---|
| Phone Number Reputation | 2022 | SEGs check phone numbers against known fraud databases |
| Callback Phishing Awareness Training | 2022 | User training on this specific attack vector |
| Pattern Detection | 2023 | SEGs flag subscription/charge notification patterns |