Attack spotlight

Callback phishing with online appointment abuse and distribution lists

September 4, 2025

Callback phishing with online appointment abuse and distribution lists

Using a meeting request confirmation email to callback phish targets on a distribution list

Ready to see Sublime 
in action
Get a demo
Authors
Brandon Webster
Brandon Webster
Detection

Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected. Get a live demo to see how Sublime prevents these attacks.

Email provider: Microsoft 365

Attack type: Callback Phishing




Adversaries use legitimate automatically generated messages to evade security. To boost blast radius, they’ll have notification and confirmation emails sent to a distribution list, hitting hundreds or thousands of targets at once. We explored this a while back in our post on callback phishing via invoice abuse and distribution list relays.

We’ve recently seen an uptick in attacks where online appointment forms are used as the mechanism for launching the attack. In a specific attack, we saw an adversary use a bank’s “Request a Meeting” form to spread a financial-related callback phishing attack. We’re going to look at how this attack worked piece by piece, but let’s start with the whole email (the bank has been redacted from the message):

Breaking down a form-based attack

This is a legitimate, autogenerated meeting confirmation message and it contains a mix of templated fields and user responses. The goal of the attack is to get the recipient to call on of two phone numbers. Combined, the numbers appear six different times in this message, along with urgent financial language.

Let’s look at what the attacker filled in or selected for each to make this email

  • First name: Your Payment of 659.99 USD received for GeekSquad.
  • Last name: To Cancel, contact at 1-802-212-####
  • Email: [distribution list email address]
  • Telephone number: 1-802-212-####
  • Additional topics: Your appointment for Geek Squad Security Installation is scheduled, and if you want to cancel, contact Geek Squad Helpdesk at 1-802-212-#### or 1-802-212-XXXX.
  • Additional notes: This transaction will be processed and reflected in your account within the next 24 hours. Any questions or concerns, don't hesitate to get in touch with Geek Squad at 1-802-212-#### or 1-802-212-XXXX.
  • Date/Time/Type/Topic/Language: All selected from options within the meeting request form.

The first name and additional topics fields set up the financial scam. The additional notes field sets a ticking clock to create urgency. The last name, telephone number, additional topics, and additional notes fields provide the callback scam phone number to reach out to to close this urgent financial issue. Finally, the attacker provided a distribution list email as their personal email address, so the notification is sent to every target on the list. And because the notification email is routed through a distribution list relay, the sender email address remains original bank email address, so it arrives without any DMARC, DKIM, or SPF authentication failures.

This is a fast, repeatable attack that only requires a distribution list, callback numbers, and a few lines of text. Additionally, as it is being delivered from a legitimate domain that the target may have previously corresponded with, the attack is less likely to be flagged as suspicious or malicious.

Detection signals

Sublime's AI-powered detection engine prevented both of these attacks. The top signals for these attacks were:

  • Mismatched context: Banking meeting confirmation mixed with tech support billing.
  • Multiple call-to-action phone numbers: Multiple references to calling two specific phone numbers about a charge.
  • Urgent language: The message notifies the target about an unexpected transaction being processed within 24 hours.
  • Commonly abused brand: GeekSquad is commonly use in callback phishing attacks.
  • Suspicious return path: Return path domain doesn't match sender domain.

See the full Message Query Language (MQL) that detected this attacks in the publicly available Rule in the Core Feed: Inbound message from popular service via newly observed distribution list.

Prevent attacks delivered via legitimate sources

Bad actors will abuse legitimate resources in order to hide behind friendly domains. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on seemingly minor discrepancies.

If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.

Read more Attack Spotlights:

Heading

About the authors

Brandon Webster
Brandon Webster
Detection

Brandon is an Email Security Analyst at Sublime. Having a naturally sharp eye for details, patterns, and anomalies, he enjoys honing his skills in the ever-changing landscape of threat detection and prevention.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

December 29, 2025
5 email security trends from 2025
Sublime news

5 email security trends from 2025

Brian BaskinPerson
Brian Baskin
Threat Research
Person
December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person
December 16, 2025
Evolving our brand as Sublime grows
Sublime news

Evolving our brand as Sublime grows

Omar JalalzadaPerson
Omar Jalalzada
Head of Design
Kirk JohnsonPerson
Kirk Johnson
Creative Director

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern