Is the U.S. Being Played by Benjamin Netanyahu?
Getting Data
Loading...

Social Engineering Evolves as Hackers Leverage PDFs and Callback Tactics

Cybercriminals are rapidly advancing social engineering by weaponizing PDFs and callback phishing, exploiting brand trust, and bypassing traditional security defenses. Organizations face an urgent need to adapt as these tactics surge globally.

AvatarJR

By Jace Reed

3 min read

Image for illustrative purpose.
Image for illustrative purpose.

Attackers are transforming the landscape of social engineering by employing callback phishing, also known as Telephone-Oriented Attack Delivery (TOAD), in combination with PDF attachments.

Instead of relying on malicious links, these campaigns persuade victims to call phone numbers embedded in seemingly legitimate PDFs, often impersonating trusted brands like Microsoft, DocuSign, and the USPS.

Once engaged, the attacker, posing as a customer service representative, manipulates victims into revealing sensitive information or installing malware, exploiting the inherent trust in voice communication and the perceived security of phone calls.

Trusted Brands Become Prime Targets for Impersonation

The latest wave of phishing attacks leverages the credibility of well-known brands to deceive targets. The most frequently impersonated companies are Microsoft and DocuSign, with NortonLifeLock, PayPal, and Geek Squad following closely behind.

Attackers embed brand logos, official-looking language, and even QR codes within PDFs, enhancing the illusion of legitimacy. This tactic capitalizes on users’ familiarity with these brands, making them more likely to comply with urgent requests or initiate a callback.

Did you know?
Cybercrime is a massive global economy, with damages predicted to reach $10.5 trillion annually by 2025. If it were a country, cybercrime would be the world's third-largest economy after the U.S. and China.

PDF Attachments and QR Codes Expand the Attack Surface

PDFs have become the attachment of choice for cybercriminals, accounting for 36 percent of phishing-related email attachments, just ahead of SVG files.

These documents are not only ubiquitous in business workflows but are also perceived as secure and tamper-proof, a misconception that attackers exploit.

Malicious PDFs may contain embedded QR codes or annotations that direct users to phishing sites or prompt them to call attacker-controlled numbers. On mobile devices, the risks are amplified due to limited visibility into file contents and weaker endpoint protections.

ALSO READ | How Are U.S. Agencies Preparing for a Surge in Iranian-Backed Cyberattacks?

Human-Centric Tactics Outpace Traditional Email Defenses

The shift toward callback phishing reflects a broader trend: attackers are prioritizing human-centric, low-tech methods that evade traditional email security filters.

As organizations have improved their ability to detect malicious links, cybercriminals have pivoted to tactics that leave little digital trace.

In the first quarter of 2025, callback scams accounted for 16 percent of phishing attempts, a sharp rise from the previous year, while link-based attacks declined by 42 percent.

The live interaction of a phone call allows attackers to manipulate emotions and responses in real time, increasing the likelihood of success.

Organizations Face Growing Pressure to Adapt Security Strategies

The surge in PDF-based callback phishing is forcing organizations to rethink their security postures. Standard email filtering is often ineffective against these threats, as the malicious payload is delivered through trusted file formats and live voice interaction rather than suspicious links.

Security experts recommend enhanced brand impersonation detection, user education on the risks of unsolicited communications, and advanced monitoring for VoIP-based callback numbers.

Without swift adaptation, enterprises risk exposure to credential theft, malware infections, and large-scale data breaches.

How prepared is your organization to detect and respond to PDF-based callback phishing attacks?

Total votes: 166

(0)

Please sign in to leave a comment

Related Articles

MoneyOval

MoneyOval is a global media company delivering insights at the intersection of finance, business, technology, and innovation. From boardroom decisions to blockchain trends, MoneyOval provides clarity and context to the forces driving today’s economic landscape.

© 2025 Wordwise Media.
All rights reserved.