February 25, 2026 Source: Dark Reading 4 min read · 823 words

Why 'Call This Number' TOAD Emails Beat Gateways

Чому email'и TOAD з проханням 'Зателефонувати на номер' обходять шлюзи

Threat Actors Are Bypassing Your Email Gateway With Just a Phone Number

Email gateways aren't catching them. That's the problem nobody wanted to hear about right now.

According to Dark Reading, security researchers have documented an active attack campaign where threat actors send emails containing nothing but phone numbers—a technique being called TOAD (Toll-based Obfuscation and Anomaly Detection evasion). The emails slip past traditional security controls because they contain no malicious links, no attachments, no suspicious content. Just a number and a prompt to call it.

And when you call? Social engineering. Wire fraud. Credential theft. The whole playbook, delivered through voice instead of text.

This is particularly nasty because it exploits a blind spot that's been hiding in plain sight. Most email security solutions are trained to hunt for malware signatures, phishing URLs, and credential harvesting attempts. They're looking for bad things embedded in messages. But a phone number? That's just data.

Breaking It Down

Let's be clear about what we're looking at here. This isn't some theoretical vulnerability or a proof-of-concept in a lab. Dark Reading reported on real-world incidents where this technique is actively bypassing deployed security infrastructure at actual organizations.

The attacker's playbook is refreshingly simple, which is probably why it works so well.

Step one: Craft an email that looks legitimate enough to land in someone's inbox. Could be pretending to be from HR, IT support, a vendor, whatever. Step two: Put a single phone number in the body. Step three: Add minimal text directing the recipient to call that number for account verification, urgent support, payment processing, or some other plausible business reason.

The email passes through gateways because there's nothing for the gateway to flag.

Recipients call the number. On the other end is a social engineer running a scam. They might impersonate an IT staffer and ask for credentials. They might pretend to be from the finance department requesting wire transfer authorization. They might claim there's a security incident and need immediate account access.

No malware. No phishing domain. No suspicious file. Just a conversation that tricks someone into handing over something valuable.

The Technical Side

Here's why this attack actually works from a cybersecurity perspective. Email gateways rely on pattern matching and threat intelligence to block messages. They're looking for known bad domains, obfuscated URLs, suspicious file types, and payload indicators. Some use sandboxing to detonate attachments and analyze behavior. Others scan for phishing characteristics using machine learning models trained on millions of malicious emails.

But none of that catches a phone number.

There's no CVE here. There's no vulnerability in code. The attack exploits the gap between what security tools are designed to detect and what humans might actually fall for. It's a reminder that technical defenses only work when they're aligned with the actual threat you're facing.

The attacker essentially weaponized simplicity.

And because the attack relies on human psychology rather than technical exploitation, it's nearly impossible for a gateway to distinguish a malicious TOAD email from a legitimate callback request. Your system can't tell the difference between a real IT department asking you to call back and a threat actor using the same technique.

Who's Affected

Anyone with email. Anyone with a phone. Anyone who answers calls from numbers they don't recognize.

Dark Reading didn't narrow down a specific vertical or organization type, which suggests this is broadly applicable across industries. Financial services are vulnerable. Healthcare is vulnerable. Tech companies are vulnerable. Government agencies are vulnerable. If your organization uses email gateways—and lets be honest, you do—you're potentially in scope.

The real risk isn't to your infrastructure. It's to the person at their desk who gets the email and thinks they're doing the right thing by following instructions from someone who sounds authoritative.

So what happens next?

What To Do Now

First, your email gateway isn't going to save you on this one. Accept that limitation and move on to what actually works.

Security awareness training needs an update. Not the generic annual checkbox compliance stuff. Real, specific training about callback scams, phone number verification requests, and social engineering via voice calls. Show your team examples of what these emails look like. Tell them explicitly: legitimate IT requests shouldn't come through random emails containing only phone numbers.

Second, implement verification protocols. If someone receives an email asking them to call a number, they should independently verify that number through official channels. Call your company's main number. Ask to be transferred. Look up the department directly. Don't use the phone number from the email.

Third, consider whether your organization needs additional voice call monitoring or authentication controls. Some companies are deploying call recording and analysis for sensitive departments. Others are requiring callback verification through official company numbers only.

And train your help desk and IT staff specifically on this. They're often the target, because they have legitimate access to systems. Make sure they understand they should never give out credentials or system access based on a phone request, period.

This attack won't disappear because it works and it's cheap to deploy. The only thing that stops it is awareness and discipline.

Read original article →

// FAQ

Can email gateways block TOAD emails with just phone numbers?

Not effectively. Since TOAD emails contain no malicious links, attachments, or known threat signatures, most email gateways can't distinguish them from legitimate business communications. The attack exploits this technical blind spot intentionally.

What should I do if I receive an email asking me to call a number?

Don't use the phone number in the email. Instead, independently verify the sender through official channels—call your company's main number, check your employee directory, or visit the official website. Legitimate business requests should never depend on callback numbers in unsolicited emails.

Is the TOAD attack targeting specific companies or industries?

According to Dark Reading, this technique is being used broadly across multiple organizations and industries with no indication of specific targeting. Any organization relying on email gateways could be affected, making this a widespread threat.

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →