A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, employing Telephone-Oriented Attack Delivery (TOAD) or callback phishing.
A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, employing Telephone-Oriented Attack Delivery (TOAD) or callback phishing. — This cybersecurity statistic was published by Talos in July 2025. It covers topics including Phishing, TOAD. The original data appears in PDFs: Portable documents, or perfect deliveries for phish? . For the full methodology and detailed findings, refer to the original report.
Share or Copy this stat
Frequently Asked Questions
What does this statistic say?
A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, employing Telephone-Oriented Attack Delivery (TOAD) or callback phishing. This data was published by Talos and covers Phishing, TOAD.
Where does this data come from?
This statistic comes from PDFs: Portable documents, or perfect deliveries for phish? , published by Talos on July 2, 2025. You can view the original report at https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/.
What cybersecurity topics does this cover?
This statistic relates to Phishing, TOAD. Browse more statistics on Phishing or from Talos.