Callback Phishing (TOAD)

Instead of malicious links, attackers provide phone numbers for victims to call; human operators then guide victims to install malware or transfer money.

MITRE ATT&CK: T1566.001

Timeline: The Cat and Mouse

2021 ← Attack emerges β†’ 2022 ← Goes mainstream β†’ 2023 ← Detection improves β†’ Present

The Evolution

Phase Period What Happened
ATTACK Mar 2021 BazarCall campaign pioneers callback phishing at scale
ADOPTION 2021-2022 Ransomware groups (Conti, Royal) adopt technique
PEAK 2022 Widespread use; combines email phishing with vishing
RESPONSE 2022 Phone number reputation databases emerge
Β  2023 SEGs add pattern detection for subscription/charge lures
CURRENT Present Still highly effective; human element hard to defend

Key Events with Sources

Date Event Significance Source
Mar 2021 BazarCall emerges First large-scale callback phishing operation Proofpoint
2021 Conti adopts technique Ransomware operators use callback for initial access AdvIntel
2022 Luna Moth campaign BEC-focused callback phishing steals millions Unit42
2022 Phone reputation services SEGs begin checking numbers against fraud databases Proofpoint
2023 Pattern detection Email security flags subscription/charge + phone patterns Cofense

Overview

Callback phishing (also called TOAD - Telephone-Oriented Attack Delivery) flips the traditional phishing model. Instead of sending malicious links or attachments, attackers send emails with phone numbers. When victims call, live operators use social engineering to guide them through malware installation or financial fraud.

The Attack

How It Works

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  EMAIL                                                 β”‚
β”‚                                                        β”‚
β”‚  Subject: Subscription Renewal - $399.99               β”‚
β”‚                                                        β”‚
β”‚  Your annual subscription to Premium Security Suite    β”‚
β”‚  has been renewed for $399.99.                         β”‚
β”‚                                                        β”‚
β”‚  If you did not authorize this charge, call us at:     β”‚
β”‚  1-888-XXX-XXXX within 24 hours for a full refund.     β”‚
β”‚                                                        β”‚
β”‚  [No links, no attachments]                            β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                          β”‚
                          β–Ό
              Victim calls number
                          β”‚
                          β–Ό
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚  CALL CENTER (Attacker-Operated)                       β”‚
β”‚                                                        β”‚
β”‚  "To process your refund, I need to connect to your    β”‚
β”‚   computer to verify the transaction. Please go to     β”‚
β”‚   support-teamviewer.com and enter session ID..."      β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                          β”‚
                          β–Ό
        Attacker has remote access to victim's computer
                          β”‚
                          β–Ό
        Malware installed, data stolen, or fraud executed

Why It Bypasses Security

No Malicious Content:

  • No links to scan
  • No attachments to analyze
  • No URLs to reputation check
  • Email is just text

Human-Driven:

  • Live operator adapts in real-time
  • Can overcome objections
  • Builds rapport and trust
  • Guides victim through security warnings

Authority + Urgency:

  • Fake charge creates alarm
  • Time limit creates pressure
  • β€œRefund” motivates action
  • Professional call center appearance

Common Lures

Subscription Charges:

Norton LifeLock: $499.99
McAfee Antivirus: $399.99
GeekSquad: $349.99
Amazon Prime: $139.99

Order Confirmations:

"Your order for MacBook Pro ($2,499) is confirmed"
"iPhone 15 Pro shipping to [address]"

Account Alerts:

"Suspicious login detected - call to verify"
"Your account will be closed - call to prevent"

The Call Center

Attackers operate actual call centers:

  • Often offshore locations
  • Trained operators with scripts
  • Multiple operators for volume
  • Technical knowledge to guide victims

Typical Script:

  1. Verify caller identity (builds trust)
  2. Express concern about the β€œfraud”
  3. Offer immediate refund
  4. Require remote access to β€œprocess refund”
  5. Once connected: install malware, steal data, or transfer funds

Malware Delivery Path

1. Victim grants remote access (TeamViewer, AnyDesk, etc.)
2. Operator "checks" computer
3. Opens browser, downloads malware
4. Executes with victim watching (disguised as "scanner" or "removal tool")
5. BazarLoader, IcedID, or similar malware installed
6. Later: Ransomware deployment

Financial Fraud Path

1. Victim grants remote access
2. Operator opens banking site
3. Asks victim to log in
4. "Accidentally" transfers too much as "refund"
5. Asks victim to wire back the difference
6. Victim sends real money; "refund" was fake/reversed

Defenses

Email Detection

SEGs can flag:

  • Phone numbers in emails from unknown senders
  • Subscription/charge language + contact number
  • Numbers matching known fraud databases
  • Patterns indicating callback phishing

Phone Number Reputation

Databases track:

  • Numbers used in fraud
  • Temporary/VoIP numbers
  • International numbers with fraud history

User Training

Critical training points:

  • Legitimate companies don’t ask for remote access for refunds
  • Never call numbers from suspicious emails
  • Use official contact methods from known sources
  • Hang up and call official number if uncertain

Remote Access Controls

  • Block unauthorized remote access tools
  • Alert on remote access tool installation
  • Require approval for remote sessions

Attacker Adaptation

Multiple Phone Numbers

Rotate numbers to avoid reputation:

Call 1-888-111-XXXX or 1-888-222-XXXX

Legitimate-Seeming Numbers

  • US toll-free numbers (1-800, 1-888)
  • Local area codes
  • β€œOfficial-looking” formats

Callback Scheduling

"We're experiencing high volume. Leave your number
and we'll call you back within 2 hours."

Attacker calls victimβ€”harder to verify legitimacy.

Legitimate Platform Abuse

Use real support chat/callback features:

  • Compromise vendor support accounts
  • Use legitimate scheduling systems
  • Harder to distinguish from real support

Current State

Status: Active

Callback phishing is highly effective:

Why It Works Defensive Challenges
No technical indicators Hard to scan phone numbers
Human operators adapt Can’t automate defense
Creates urgency/fear Emotional manipulation works
Victims self-select Those who call are engaged

Detection Guidance

Email Indicators

Flag emails with:

  • Phone numbers + charge/subscription theme
  • Urgency + contact request
  • No links/attachments (unusual for notifications)
  • Slightly off branding

User Reports

Encourage reporting:

  • Unexpected subscription emails
  • Requests to call unfamiliar numbers
  • Anyone asking for remote access

Endpoint Monitoring

Watch for:

  • Remote access tool installation
  • Remote sessions from unknown IPs
  • Browser navigation to remote access sites

SIEM Correlation

email.body CONTAINS phone_number
AND email.body MATCHES (subscription|charge|renewal|refund)
AND email.links.count = 0
AND email.attachments.count = 0

What Killed It (or Weakened It)

Defense Introduced Impact
Phone Number Reputation 2022 SEGs check phone numbers against known fraud databases
Callback Phishing Awareness Training 2022 User training on this specific attack vector
Pattern Detection 2023 SEGs flag subscription/charge notification patterns