Threat IntelHIGH

TOAD Emails Bypass Security with Just a Phone Number

DRDark ReadingFeb 25, 2026
TOADemail securityphishingcybersecurity
🎯

Basically, hackers are sending emails that only contain a phone number to trick people.

Quick Summary

Hackers are now using simple emails with just a phone number to bypass security. This new tactic targets unsuspecting users, posing risks to your personal information. Stay cautious and verify before calling any number from an email.

What Happened

Imagine receiving an email that looks harmless, just a phone number. This is the new tactic called Telephone-Oriented Attack Delivery (TOAD), and it’s causing a stir in cybersecurity circles. Attackers are exploiting this method to bypass traditional email security gateways, which usually scan for malicious attachments or links.

TOAD emails are simple yet effective. They contain no attachments or links that security systems typically flag. Instead, they just ask you to call a number, making it difficult for automated systems to detect any malicious intent?. This clever tactic allows attackers to reach their targets without raising alarms, making it a growing concern for organizations worldwide.

Why Should You Care

You might wonder how this affects you. Well, think about how often you check your email. If you receive a TOAD email, you could unknowingly expose yourself to scams or phishing attacks. Just like a seemingly innocent text from a stranger can lead to trouble, these emails can lure you into calling a number that connects you to a scammer.

In your daily life, this means you need to be extra cautious. If you receive an email that looks odd or just contains a phone number, don’t rush to call. Always verify the source first. Your personal information and finances could be at risk.

What's Being Done

Cybersecurity experts are on high alert. Organizations are being advised to enhance their email filtering systems to catch these TOAD emails. Here are a few actions you can take right now:

  • Be skeptical of emails that only contain a phone number.
  • Verify the sender before making any calls.
  • Keep your security software updated to help detect unusual email patterns.

Experts are watching for how this tactic evolves and whether attackers will expand their methods. Stay informed and vigilant to protect yourself from these sneaky scams.

💡 Tap dotted terms for explanations

🔒 Pro insight: TOAD tactics highlight a shift in attack strategies, emphasizing the need for adaptive email security measures.

Original article from

Dark Reading · Alexander Culafi

Read Full Article

Related Pings

HIGHThreat Intel

Alignment: The Key to Cybersecurity Success

Organizations are prioritizing alignment in cybersecurity to enhance their defenses. This affects everyone, as misalignment can leave your data exposed. Companies are now investing in training and collaboration to strengthen their security posture. Stay informed about how these changes impact your safety online.

Anthropic Research·Today, 3:38 AM
HIGHThreat Intel

FBI Probes Suspicious Cyber Activity on Surveillance Systems

The FBI is looking into suspicious cyber activity affecting sensitive surveillance systems. This could impact privacy and data security. Stay informed and review your own security practices.

SecurityWeek·Today, 1:01 AM
MEDIUMThreat Intel

AI-Powered Cyber Defense: Trump's New Strategy Unveiled

The Trump administration has announced a new cybersecurity strategy focusing on AI for defense. While promising, it lacks crucial details. This could affect your online security, so stay informed about developments.

Cybersecurity Dive·Yesterday, 10:36 PM
HIGHThreat Intel

Iran's MuddyWater Breaches Multiple U.S. Organizations

Iran's MuddyWater hacking group has breached multiple U.S. organizations, raising significant security alarms. These attacks could compromise sensitive information and disrupt essential services. The FBI is investigating, and Cisco has issued critical patches to address vulnerabilities.

CyberWire Daily·Yesterday, 9:30 PM
HIGHThreat Intel

MuddyWater APT Hits U.S. Organizations with Dindoor Malware

MuddyWater, an Iranian hacker group, is targeting U.S. organizations with new Dindoor malware. Banks, airports, and nonprofits are at risk of data breaches and disruptions. Cybersecurity teams are responding with updates and monitoring measures to protect sensitive information.

Security Affairs·Yesterday, 8:05 PM
HIGHThreat Intel

North Korean Threat Groups Exploit AI for Fake Worker Schemes

North Korean hackers are using AI to create fake job applicants. This tactic poses serious risks to companies and their sensitive data. Microsoft warns organizations to enhance their recruitment processes to combat this growing threat.

CyberScoop·Yesterday, 7:16 PM