Cybersecurity are warning of a growing shift in attack techniques as telephone-oriented attack delivery (TOAD) gains traction among threat actors. Instead of relying on malicious links or attachments, attackers are increasingly sending seemingly harmless emails that prompt victims to call a support number where social engineering takes over.
A newly identified cybercrime platform known as ATHR is accelerating this trend by turning what was once a complex, manual operation into a highly automated and scalable attack model. According to research from Abnormal Security, ATHR is being sold on underground forums for around $4,000 plus a share of profits, making advanced phishing campaigns accessible to a wider range of attackers.
ATHR consolidates the entire TOAD attack chain into a single platform. It enables threat actors to manage email lures, phone interactions, and credential harvesting from one centralized interface. The system includes spoofed email delivery tools that mimic trusted brands, along with browser-based telephony powered by WebRTC eliminating the need for specialized hardware.
A key feature of the platform is its use of AI-driven voice phishing (vishing) agents. These agents leverage text-to-speech technology and structured scripts to guide victims through conversations, often persuading them to disclose credentials or install remote access software. At the same time, attackers can monitor calls in real time and capture sensitive information, including multi-factor authentication codes.
The platform also introduces a feedback loop that allows attackers to refine campaigns instantly. By tracking response rates and adjusting email content or sender profiles on the fly, threat actors can continuously evolve their tactics, making detection more difficult for traditional security systems.
Security experts note that TOAD attacks are particularly challenging to stop because they lack common indicators of compromise. Emails used in these campaigns typically pass authentication checks such as SPF, DKIM, and DMARC, as they contain no malicious links or attachments. As a result, conventional email security tools often fail to identify them as threats. The emergence of ATHR highlights a broader shift toward automation and AI in cybercrime. By lowering the technical barrier, the platform allows a single operator to run large-scale phishing campaigns across multiple brands simultaneously.
emphasize that defending against these attacks requires a move beyond traditional detection methods. Instead of focusing solely on payload analysis, organizations are being urged to adopt behavioral monitoring and user-awareness strategies to identify suspicious interactions. As AI-powered phishing tools continue to evolve, experts warn that distinguishing between legitimate communications and sophisticated social engineering attempts will become increasingly difficult, raising the stakes for both organizations and end users.
Recommended Cyber Technology News:
- Northeast Spine Data Breach Exposes 7K N.J. Patients
- Cloudflare Unveils Mesh for AI Agent Infrastructure Security
- WatchGuard and HaloPSA Partner to Streamline MSP Security
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading



