Why callback phishing is structurally novel
Callback phishing inverts the standard email-phishing payload model. The lure email contains no malicious URL, no malicious attachment, and nothing that an email-gateway content scanner can flag as suspicious. The lure contains a phone number, presented in the body of what looks like a routine invoice, subscription confirmation, or charge-dispute notification. The victim, alarmed by an unexpected charge or unfamiliar subscription, calls the phone number to dispute or cancel. The attacker, operating the phone number on the other end, then delivers the malicious payload through a social-engineering conversation that frequently ends with the victim installing a remote-access tool on their machine.
The pattern is structurally novel because every defensive layer the email-security industry built between 2010 and 2022 was oriented around scanning URLs and attachments for malicious content. A phone number in an email body is not a URL and is not an attachment; it is plain text. Email gateways have no meaningful way to evaluate whether a phone number is malicious because phone numbers in invoices, customer-service emails, and shipping confirmations are routine. The defender problem is that the malicious content lives entirely outside the email message in the subsequent phone conversation.[Proofpoint TOAD research 2022-2024 + Mandiant M-Trends 2024]