Hang up on callback phishing with Sublime

A single successful callback phishing attack opens the door for financial scams, ransomware, and more. Sublime's AI-powered callback phishing detection keeps callback phish out of inboxes and safely in quarantine.

Our previous solution delivered a well-crafted phishing email to our technology team, but Sublime identified it as malicious immediately. That was our first 'oh yeah, Sublime is way better' moment.

Callback phishing
Patrick Lafleur
Director of Information Security & Privacy, Maple

Callback phishing in a nutshell

Callback phishing

Callback phishing, or telephone-oriented attack delivery (TOAD), is an attack that usually begins with a fake invoice or receipt.

These attacks often appear to be a charge from a well-known company, and the goal is to get a target to call a number for assistance. Once on the phone, the attacker often poses as a customer service representative, asking for personal information, offers to help "cancel the charge," or convinces the target to install remote support software.

From there, they can access the device, steal sensitive data, or walk a target through a fake refund process that results in real financial loss.

What makes callback phishing so slippery

Callback phishing attacks can be difficult to catch when security tools are looking for some of the traditional indicators of attacks.

Linkless legitimacy

Callback phishing attacks don't have a traditional malicious URL or payload, requiring specialized scanning to detect.

Embedded callbacks

To further evade security tools, adversaries will often put the callback information in embedded images, so as not to be picked up by body text analysis.

Attacks in attachments

Attackers will put callback information within attachments, sometimes nested within archives, to make it easy for humans to find but difficult to detect.

Tools for catching callback phishing

Callback phishing can be difficult for most security platforms, but Sublime uses a layered combination of AI, machine learning, and org-specific detections to catch the phish.

01

Intent analysis

Sublime uses Natural Language Understanding (NLU) to understand the intent of a message. By comparing the intent with the data and metadata of an email, callback phish quickly come into focus.

02

Computer vision

Sublime takes a screenshot of messages and attachments and looks for brand logos, QR codes, and runs it through Optical Character Recognition (OCR). These analyses let us catch brand impersonations and text embedded as images to avoid body scanning – common evasions for attackers.

03

Attachment analysis

Sublime analyzes attachments and images with OCR and intent analysis the same way it analyzes the email body. This includes recursive analysis of archives, scanning all files within regardless of depth.

Advanced callback phishing detection for your organization

See how Sublime's comprehensive callback phishing platform can safeguard your business from callback phishing attacks.

Select all applicable use cases
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Latest on callback phishing

The latest news, research, and attack spotlights about callback phishing.

November 3, 2025
Attack spotlight

ICS phishing: Stopping a surge of malicious calendar invites

Ahry Jeon
Product Manager
Brandon Murphy
Detection
October 23, 2025
Attack spotlight

Direct Send abuse on Microsoft 365: Just another failed authentication

Peter Djordjevic
Detection
October 16, 2025
Attack spotlight

Facebook credential phishing with job scams impersonating well-known companies

Bryan Campbell
Detection

Frequently asked questions

No items found.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.