Hackers Exploit PDFs to Impersonate Microsoft, DocuSign, and Others in Callback Phishing Schemes

Cybersecurity experts have raised alarms about phishing campaigns that mimic well-known brands, deceiving victims into calling phone numbers managed by cybercriminals. According to Cisco Talos researcher Omid Mirzaei, “A notable percentage of email threats featuring PDF payloads persuade victims to dial adversary-controlled numbers, showcasing a prevalent social engineering tactic referred to as Telephone-Oriented Attack Delivery (TOAD) or callback phishing.” An analysis of phishing emails with PDF attachments from May 5 to June 5, 2025, found that Microsoft and DocuSign were the most frequently impersonated brands. Other notable targets in TOAD emails included NortonLifeLock, PayPal, and Geek Squad. This surge in activity forms part of broader phishing efforts that leverage the trust associated with popular brands to provoke harmful actions. Typically, these messages include PDF attachments…

Hackers Target Users with PDF-Based Callback Phishing Impersonating Microsoft and DocuSign

July 2, 2025

Recent findings from cybersecurity experts highlight an alarming trend in phishing attacks that exploit the trust associated with reputable brands such as Microsoft and DocuSign. These campaigns leverage PDF attachments to manipulate unsuspecting victims into calling phone numbers controlled by malicious actors. Termed Telephone-Oriented Attack Delivery (TOAD) or callback phishing, this technique is gaining traction among cybercriminals as they seek to bypass traditional email security measures.

A comprehensive analysis conducted by Cisco Talos between May 5 and June 5, 2025, revealed that the overwhelming majority of phishing emails featuring PDF payloads are designed to dupe recipients into initiating phone calls to adversary-operated numbers. The report indicates that Microsoft and DocuSign emerged as the most frequently impersonated brands, a testament to their widespread recognition and the trust they command among users. Other notable targets included NortonLifeLock, PayPal, and Geek Squad, further illustrating the deceptive tactics employed in TOAD campaigns.

These phishing emails typically contain cleverly crafted messages and PDF attachments that aim to seem legitimate, thereby exploiting the victims’ familiarity with the brands. The objective is straightforward: to manipulate individuals into divulging sensitive information or following harmful instructions under the guise of recognized institutions.

By leveraging social engineering techniques, such as impersonation of trusted brands, these phishing attacks effectively exploit established consumer trust to initiate malicious activities. The potential repercussions for affected organizations and individuals can be severe, ranging from financial losses to the compromising of sensitive personal data.

From a cybersecurity perspective, this type of campaign underscores the importance of understanding the tactics outlined in the MITRE ATT&CK framework. Adversaries are likely employing multiple tactics for initial access, such as phishing and social engineering, to lure victims into engaging with their malicious infrastructure. Once contact is established, further techniques may include credential dumping or data exfiltration, facilitating ongoing exploitation and persistence within targeted environments.

Protective measures against such attacks necessitate heightened awareness and education among employees about the risks associated with unsolicited communications. Organizations should prioritize training programs that focus on recognizing the signs of phishing attempts and the importance of verifying the authenticity of communication before taking action.

In conclusion, as phishing tactics continue to evolve, so must the strategies employed by businesses to safeguard against these threats. Staying informed about current threat landscapes and understanding the methodologies of cyber attackers is crucial for fostering a resilient cybersecurity posture.

Source link