Skip to main content
Back to Home

A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, employing Telephone-Oriented Attack Delivery (TOAD) or callback phishing.

July 2, 2025

A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, employing Telephone-Oriented Attack Delivery (TOAD) or callback phishing. — This cybersecurity statistic was published by Talos in July 2025. It covers topics including Phishing, TOAD. The original data appears in PDFs: Portable documents, or perfect deliveries for phish? . For the full methodology and detailed findings, refer to the original report.

Source

View Original Report

Published on 7/2/2025

Share or Copy this stat

Frequently Asked Questions

What does this statistic say?

A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, employing Telephone-Oriented Attack Delivery (TOAD) or callback phishing. This data was published by Talos and covers Phishing, TOAD.

Where does this data come from?

This statistic comes from PDFs: Portable documents, or perfect deliveries for phish? , published by Talos on July 2, 2025. You can view the original report at https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/.

What cybersecurity topics does this cover?

This statistic relates to Phishing, TOAD. Browse more statistics on Phishing or from Talos.

Want More Statistics Like This?

Get the latest cybersecurity stats delivered to your inbox every week

Stay Ahead of Cyber Threats

Join 1,000+ security professionals getting weekly insights