Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsWhy 'Call This Number' TOAD Emails Beat Gateways
Why 'Call This Number' TOAD Emails Beat Gateways
CybersecurityCIO PulseDefense

Why 'Call This Number' TOAD Emails Beat Gateways

•February 25, 2026
0
Dark Reading
Dark Reading•Feb 25, 2026

Why It Matters

Because TOAD attacks sidestep conventional content‑filter rules, they expose enterprises to credential theft and financial fraud despite existing gateway protections. Understanding this vector forces organizations to adopt behavior‑based detection and employee training to mitigate the risk.

Key Takeaways

  • •TOAD emails bypass 28% of gateway detections
  • •Phone-number-only payload evades traditional email filters
  • •1,400 evasion combos, 130% increase since last study
  • •Law firms targeted using fake Docusign invoices
  • •AI-driven models suggested to detect subtle TOAD signatures

Pulse Analysis

The phishing landscape has long been dominated by malicious links and attachments, but the latest StrongestLayer report shows a shift toward extreme minimalism. Telephone‑oriented attack delivery, or TOAD, reduces the email body to a single phone number embedded in a faux‑billing notice. This stripped‑down payload is indistinguishable from legitimate customer‑service contacts, allowing it to glide past rule‑based scanners that rely on keywords, URLs, or file signatures. As a result, TOAD accounted for nearly one‑third of all gateway‑bypassing detections in the 5,000‑sample dataset, making it the most prevalent evasion technique observed.

The simplicity of TOAD translates into a dramatic cost advantage for threat actors. Where a targeted spear‑phishing campaign once required dozens of dollars per email, generative AI tools now enable the creation of convincing invoice templates for a few cents each. Law firms and enterprises that process high volumes of Docusign or PayPal invoices are especially vulnerable, because blocking such messages would disrupt legitimate business flow. The report also documented a 130 % surge in unique evasion combinations, indicating that attackers are layering multiple tricks—QR codes, multi‑hop redirects, and brand spoofing—to increase success rates.

Defenders must move beyond static rule sets and incorporate context‑aware analytics. Machine‑learning models that profile sender behavior, detect anomalous phone‑number patterns, and cross‑reference known brand communication channels can flag TOAD attempts before a user picks up the call. Complementary employee training—emphasizing that finance departments never request payment verification via phone—adds a human layer of verification. As AI‑driven phishing continues to evolve, organizations should evaluate tiered email security offerings and consider dedicated TOAD detection modules to safeguard credential integrity and financial assets.

Why 'Call This Number' TOAD Emails Beat Gateways

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...