A newly documented cybercrime platform sells telephone-based phishing as a fully automated service, replacing the manual infrastructure that previously limited the scale of vishing operations with an AI-driven system that any operator can run on their own.
What happened
A telephone-oriented attack delivery (TOAD) platform called ATHR has been identified, selling automated vishing capability on underground networks for $4,000 plus a 10 percent cut of campaign profits. According to BleepingComputer, ATHR automates the entire attack chain from email lure to voice call to credential theft, replacing the fragmented manual infrastructure that previously made large-scale TOAD operations resource-intensive. The platform supports eight brands, including Google, Microsoft, Coinbase, Binance, Gemini, Crypto.com, Yahoo, and AOL. Attacks begin with a fake security alert or account notification email designed to pass authentication checks and prompt the recipient to call a customer support number. When the target calls, an AI voice agent runs a structured social engineering script in real time, guiding the victim through credential disclosure or remote access software installation while a real-time panel captures two-factor authentication codes as they are entered.
Going deeper
ATHR's AI voice agents use custom text-to-speech engines and structured scripts with branching logic, allowing the platform to handle calls without a live human operator. Browser-based telephony running on Asterisk WebRTC means attackers need no specialized hardware. A live dashboard gives operators visibility into callback rates, active calls, and harvested credentials simultaneously, allowing them to adjust email lures and spoofed sender profiles mid-campaign based on real-time performance data. Researchers noted that because ATHR emails spoof trusted brand notification formats, the messages pass SPF, DKIM, and DMARC authentication checks, meaning email security gateways that depend on technical authentication signals have no indicator to act on. The platform also incorporates a phishing-as-a-service toolkit called FlowerStorm for large-scale distribution and multi-stage attack chain management, alongside variants of Datto RMM remote monitoring software deployed under deceptive filenames for post-access persistence. According to researchers, the shift from fragmented, manually intensive operations to a productized automated platform means TOAD attacks no longer require large teams or specialized infrastructure.
What was said
Researchers stated in their analysis published by BleepingComputer that "the shift from a fragmented, manually intensive operation to a productized, largely automated one means TOAD attacks no longer require large teams or specialized infrastructure," and warned that "with the rise of ATHR-like cybercrime platforms, vishing attacks will become more frequent and more difficult to distinguish from legitimate communications." Researchers described the lure email as "typically a fake security alert or account notification, something urgent enough to prompt a phone call but generic enough to avoid triggering content-based filters."
In the know
TOAD attacks have been documented at a large scale for several years, but the volume has accelerated as automation has lowered the barrier to entry. According to Infosecurity Magazine, researchers recorded over 600,000 daily TOAD attacks at peak volume in 2025, with the technique ranked alongside MFA bypass phishing as among the most effective delivery methods observed that year. ATHR represents the next stage of that scaling, removing the human operator from the call entirely through AI voice agents, a capability that had previously required dedicated call center infrastructure and trained social engineers to execute at volume.
The big picture
Healthcare organizations are exposed to TOAD attacks at every level of their operations. Billing departments receive high volumes of calls related to insurance claims, vendor invoices, and patient payment processing, creating a workflow that mirrors the fake billing alert lures ATHR uses. IT help desks handle routine requests to reset credentials, install software, and grant remote access, which are precisely the outcomes ATHR's AI voice agents are scripted to achieve. According to Paubox's Top 3 Healthcare Email Attacks report, impersonation attacks succeed because email treats identity as trustworthy by default, and healthcare workflows amplify that risk because urgent requests from recognized vendors and IT support contacts are routine. An AI voice agent impersonating a Google account security team or a Microsoft IT support desk, running from a platform that passes all email authentication checks, presents no obvious signal for either the email gateway or the recipient to act on.
FAQs
What is telephone-oriented attack delivery, and how does it differ from standard phishing?
TOAD begins with an email containing a phone number rather than a malicious link, directing recipients to call what appears to be a legitimate support line. The attack happens over the phone rather than through a browser, bypassing email security tools that scan for malicious URLs and keeping the credential harvesting step off the organization's monitored network perimeter.
How does an AI voice agent handle a live social engineering call?
The AI agent uses text-to-speech to follow a structured script with branching responses based on what the victim says, guiding them through steps such as verifying account details, entering a code, or installing software. Real-time credential harvesting panels capture any codes entered during the call, and the operator can monitor the session and intervene if needed.
Why do ATHR emails pass SPF, DKIM, and DMARC checks?
ATHR spoofs brand notification formats using an authenticated sending infrastructure that legitimately passes email authentication checks, similar to how the GitHub and Jira notification abuse campaigns worked. The emails do not contain malicious payloads; they contain only a phone number, so content-based filters also find nothing to flag.
What is the FlowerStorm toolkit, and what part does it play?
FlowerStorm is a phishing-as-a-service toolkit integrated into ATHR's infrastructure, handling large-scale email distribution and managing multi-stage attack chains. It allows operators to rapidly rotate email templates, sender domains, and target lists across different brand impersonations within the same campaign run.
What controls reduce exposure to TOAD attacks specifically?
Training staff to verify any unexpected call or email requesting credential entry or software installation through a confirmed internal channel, regardless of how legitimate the caller sounds, addresses the social engineering element. Restricting which software can be installed on endpoints through application control policies limits the effectiveness of RMM deployment attempts that follow a successful call.
Subscribe to Paubox Weekly
Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.
