LIVE NEWS
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
  • Clinton Deposition Videos Released in Epstein Investigation
  • Elevance stock tumbles as CMS may halt Medicare enrollment
  • Wild spaces for butterflies to be created in Glasgow
  • You can now adjust how your caller card looks for calls on Android phones
  • TRON DAO expands TRON Academy initiative with Dartmouth, Princeton, Oxford, and Cambridge
  • Alex Mitchell: England scrum-half ruled out of Six Nations
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Why ‘Call This Number’ TOAD Emails Beat Gateways
Cybersecurity

Why ‘Call This Number’ TOAD Emails Beat Gateways

primereportsBy primereportsFebruary 25, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Why ‘Call This Number’ TOAD Emails Beat Gateways
Share
Facebook Twitter LinkedIn Pinterest Email


While much of the conversation surrounding phishing concerns not clicking a suspicious link or downloading a malicious attachment, there’s an attack technique gaining prominence in which the email payload consists of nothing but a phone number. And these emails are getting past defenses. 

Researchers from email security vendor StrongestLayer today published an analysis of roughly 5,000 email-based threat detections that bypassed secure email gateways across multiple enterprise environments between December 2025 and now. 

Many of the attack tactics identified were typical phishing and social engineering fare — PDF attachments, a QR code to deliver a payload, requests to pivot to a phone call, URL multi-hop redirects, and so on — with varying success rates against Microsoft- and Google-hosted email platforms. 

But much of the vendor’s focus for this latest research was on telephone-oriented attack delivery (TOAD), which accounted for nearly 28% of all gateway-bypassing detections in the research. 

Related:Iran’s MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

TOAD: Simplicity’s the Point

It’s a deceptively simple attack in which the target receives a fake billing notification impersonating an entity like PayPal, claiming a charge has been processed while including a phone number as the only way to address the charge. There’s no malicious attachment. Once the target calls, a scammer attempts to coax the victim into offering up credentials, allowing remote access into a device, or buying suspicious gift cards for equally shady transactions. 

“TOAD bypasses every email security architecture because the payload — a phone number — is indistinguishable from a legitimate business contact,” researchers said. “A rule blocking financial language combined with a phone number would fire on every billing notification in the enterprise. This is a category of attack that operates outside the detection model email security was designed for. And it is the single largest category in this dataset.”

This is doubly tricky because the average detection used more than four attack techniques simultaneously. There were also over 1,400 unique evasion combinations tracked, marking a 130% increase over the previous study period. 

Between platforms, gateway blocking rates varied. QR codes broke into Microsoft email environments without E3/E5 protections more often than in Google environments, while Google Workspace fared worse on average when it came to notifications that spoofed legitimate, trusted sources. TOAD, StrongestLayer said, worked well against both Google- and Microsoft-hosted email. 

Related:Enigma Cipher Device Still Holds Secrets for Cyber Pros

This plays into the high prevalence of evasion tactic combinations, as it benefits attackers to tailor campaigns based on which platform an employee is using. Researchers said the most sophisticated attacks use a multilayered approach; each layer defeats a different detection capability. 

The attacker may send the email through Google Calendar or SharePoint to bypass reputation-based filtering, use a QR code-based payload that doesn’t manifest as a traditional malicious binary, and/or beckon the target to use a phone call or SMS to move across channels, where the gateway cannot monitor it. 

To Catch a TOAD

Alan Lefort, CEO and co-founder of StrongestLayer, tells Dark Reading that TOAD attacks get even trickier when one considers a law firm with 5,000 seats that is more or less a “Docusign factory,” the most common brand threat actors impersonated. 

TOAD attacks have few markers that separate them from authentic emails, and a law firm can’t risk blocking legitimate Docusign emails, so the conventional email rules a business might rely on would likely prove ineffective. 

That comes in addition to the cost collapse on the threat actor’s part for scaling phishing campaigns. Lefort said an APT-level targeted reconnaissance and phishing email might have cost $15 to $20 five years ago, yet in the era of ChatGPT now costs only a few cents at most. 

Related:600+ FortiGate Devices Hacked by AI-Armed Amateur

A third of the attacks seen in the report were “structurally invisible,” he explains, which is why Lefort advocates for reasoning models that can pick up on the small signatures and trends left by TOAD emails (StrongestLayer is part of the AI-powered email protection market alongside other vendors like Abnormal AI). 

For defenders, Lefort recommends looking at detection coverage against the attack family taxonomy detailed in the report. An organization on a more basic service plan may want to consider another tier that includes stronger detections for that organization’s needs. 

On the employee training side, he points to the consistent patterns of abuse in bad sender ecosystems. An organization can make a dent against phishing campaigns by communicating to employees that they will never ask to call a phone number to handle an invoice, that payments over the phone will not be authorized unless through finance, and not to scan QR codes in PDFs. Additionally, the org can provide guidance on how to verify a request before responding to a potentially malicious email. 



Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOpenClaw is being called a security “Dumpster fire,” but there is a way to stay safe
Next Article Dow futures rise 150 points, adding to Tuesday's comeback, as Nvidia and Oracle shares gain: Live updates – CNBC
primereports
  • Website

Related Posts

Cybersecurity

Samsung Unpacked 2026 live blog: Updates on Galaxy S26 Ultra, preorder deals, and pricing

February 25, 2026
Cybersecurity

Marquis sues SonicWall over backup breach that led to ransomware attack

February 25, 2026
Cybersecurity

Manual Processes Are Putting National Security at Risk

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20255 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Global economy must stop pandering to ‘frivolous desires of ultra-rich’, says UN expert | Environment
  • Some Middle East Flights Resume but Confusion Reigns From Iran Strikes
  • Clinton Deposition Videos Released in Epstein Investigation
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.