Hang up on callback phishing with Sublime

A single successful callback phishing attack opens the door for financial scams, ransomware, and more. Sublime's AI-powered callback phishing detection keeps callback phish out of inboxes and safely in quarantine.

Bg PatternIllustration
Callback phishing

Our previous solution delivered a well-crafted phishing email to our technology team, but Sublime identified it as malicious immediately. That was our first 'oh yeah, Sublime is way better' moment.

Callback phishing
Patrick Lafleur
Director of Information Security & Privacy, Maple

Callback phishing in a nutshell

Callback phishing
Callback phishing

Callback phishing, or telephone-oriented attack delivery (TOAD), is an attack that usually begins with a fake invoice or receipt.

These attacks often appear to be a charge from a well-known company, and the goal is to get a target to call a number for assistance. Once on the phone, the attacker often poses as a customer service representative, asking for personal information, offers to help "cancel the charge," or convinces the target to install remote support software.

From there, they can access the device, steal sensitive data, or walk a target through a fake refund process that results in real financial loss.

What makes callback phishing so slippery

Callback phishing attacks can be difficult to catch when security tools are looking for some of the traditional indicators of attacks.

Linkless legitimacy

Linkless legitimacy

Callback phishing attacks don't have a traditional malicious URL or payload, requiring specialized scanning to detect.

Embedded callbacks

Embedded callbacks

To further evade security tools, adversaries will often put the callback information in embedded images, so as not to be picked up by body text analysis.

Attacks in attachments

Attacks in attachments

Attackers will put callback information within attachments, sometimes nested within archives, to make it easy for humans to find but difficult to detect.

Tools for catching callback phishing

Callback phishing can be difficult for most security platforms, but Sublime uses a layered combination of AI, machine learning, and org-specific detections to catch the phish.

Intent analysis
01

Intent analysis

Sublime uses Natural Language Understanding (NLU) to understand the intent of a message. By comparing the intent with the data and metadata of an email, callback phish quickly come into focus.

Computer vision
02

Computer vision

Sublime takes a screenshot of messages and attachments and looks for brand logos, QR codes, and runs it through Optical Character Recognition (OCR). These analyses let us catch brand impersonations and text embedded as images to avoid body scanning – common evasions for attackers.

Attachment analysis
03

Attachment analysis

Sublime analyzes attachments and images with OCR and intent analysis the same way it analyzes the email body. This includes recursive analysis of archives, scanning all files within regardless of depth.

Advanced callback phishing detection for your organization

See how Sublime's comprehensive callback phishing platform can safeguard your business from callback phishing attacks.

Select all applicable use cases
Down Arrow
check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Latest on callback phishing

The latest news, research, and attack spotlights about callback phishing.

November 21, 2025
You’ve been invited to join a Meta for Business scam!
Attack spotlight

You’ve been invited to join a Meta for Business scam!

Luke Wescottperson
Luke Wescott
Detection
Person
November 13, 2025
Salesforce infrastructure abuse: Stopping email scams and spam sent via SFDC
Attack spotlight

Salesforce infrastructure abuse: Stopping email scams and spam sent via SFDC

Brandon Murphyperson
Brandon Murphy
Detection
Person
November 3, 2025
ICS phishing: Stopping a surge of malicious calendar invites
Attack spotlight

ICS phishing: Stopping a surge of malicious calendar invites

Ahry Jeonperson
Ahry Jeon
Product Manager
Brandon MurphyPerson
Brandon Murphy
Detection

Frequently asked questions

No items found.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern