Scammers are once again abusing PDFs to trick victims into calling fake support numbers

By Sead Fadilpašić

Scammers are once again abusing PDFs to trick victims into calling fake support numbers

Skip to main content

Tech Radar Pro

Tech Radar Gaming

Tech Radar Pro

TechRadar the business technology experts

Search TechRadar

View Profile

België (Nederlands)

Deutschland

North America

US (English)

Australasia

New Zealand

Expert Insights

Website builders

Web hosting

Best website builder
Best web hosting
Best office chairs
Best antivirus
Expert Insights

Recommended reading

Fake IT support voice calls lead to cyber extortion and stolen company data

Tech support scammers are forcing their fake phone numbers into real webpages

Fake DocuSign and Gitcode sites are tricking victims into downloading malware – here’s what you need to know

Look out for tax-themed scams this month, Microsoft warns

Criminals are pretending to be Microsoft, Google, and Apple in phishing attacks

This dangerous new phishing scam spoofs a top Google program to try and hack Facebook accounts

Mass quishing attacks linked to organized crime gangs across the UK

Scammers are once again abusing PDFs to trick victims into calling fake support numbers

Sead Fadilpašić

3 July 2025

No, you’re not talking to a Microsoft representative

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

(Image credit: Shutterstock.com / Atstock Productions)

Cisco Talos warns of callback phishing scams on the rise
Phishing emails come with PDF attachments, in which are phone numbers
Threat actors are exploiting people’s trust in phone calls

Security researchers from Cisco Talos have warned of an ongoing phishing campaign in which victims are tricked into calling the attackers on the phone.

In a new report, the researchers said that between early May and early June 2025, they observed threat actors spoofing major tech companies, such as Microsoft, Adobe, or Docusign.
Cisco Talos calls this type of scam “callback phishing” – in the phishing emails, they would notify the victims of a problem, or an incoming/pending transaction, then share a phone number they control, and invite the victim to dial in and address these issues. During the call, the attackers would masquerade as a legitimate customer representative and explain to the victim that in order to sort out their problem, they need to either disclose sensitive information, or install a piece of malware on their device.

You may like

Fake IT support voice calls lead to cyber extortion and stolen company data

Tech support scammers are forcing their fake phone numbers into real webpages

Fake DocuSign and Gitcode sites are tricking victims into downloading malware – here’s what you need to know

Get 55% off Incogni’s Data Removal service with code TECHRADAR
Wipe your personal data off the internet with the Incogni data removal service. Stop identity thieves
and protect your privacy from unwanted spam and scam calls.

Callback phishing
“Attackers use direct voice communication to exploit the victim’s trust in phone calls and the perception that phone communication is a secure way to interact with an organization,” the researchers explained.

“Additionally, the live interaction during a phone call enables attackers to manipulate the victim’s emotions and responses by employing social engineering tactics. Callback phishing is, therefore, a social engineering technique rather than a traditional email threat.”
Most phone numbers used in these campaigns are VoIP ones, Cisco Talos further explained, stating that these are more difficult to trace.
The key information, including the attacker-controlled phone number, is shared via a .PDF file sent as an attachment. This is usually done to bypass traditional email security mechanisms and ensure the email lands in the inbox.

Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Contact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
As an added layer of obfuscation, the attackers would sometimes add a QR code into the body of the PDF file, since most AV and email protection tools cannot scan that deep. Furthermore, QR codes are usually scanned via smartphone cameras, and mobile devices rarely have the same level of security as laptops or desktop computers do.
Via The Hacker News
You might also like

America is the top source of spam, and it’s getting worse thanks to growing data center infrastructure
Take a look at our guide to the best authenticator app
We’ve rounded up the best password managers

Sead Fadilpašić

Social Links Navigation

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Fake IT support voice calls lead to cyber extortion and stolen company data

Tech support scammers are forcing their fake phone numbers into real webpages

Fake DocuSign and Gitcode sites are tricking victims into downloading malware – here’s what you need to know

Look out for tax-themed scams this month, Microsoft warns

Criminals are pretending to be Microsoft, Google, and Apple in phishing attacks

This dangerous new phishing scam spoofs a top Google program to try and hack Facebook accounts

Latest in Security

Signal clone used by federal agencies hit in attacks targeting major flaws – CISA says patch immediately

The AI-powered future of ransomware is coming soon – here’s what we need to look out for

Security breach reveals Catwatchful spyware is snooping on thousands of phones – here’s how to stay safe

Cisco warns of a serious security flaw in comms platform – and that it needs patching immediately

Google has patched another urgent security flaw in Chrome – so update now or be at risk

Security experts flag another worrying issue with Anthropic AI systems – here’s what they found

Latest in News

AMD’s impressive free RX 9070 XT speed boosts confirmed in new benchmarks – and they make the GPU a better buy than Nvidia’s RX 5070 Ti

An unannounced MMO from The Elder Scrolls Online developer has been canceled by Xbox after seven years of work

Signal clone used by federal agencies hit in attacks targeting major flaws – CISA says patch immediately

The Pixel 6a will get a mandatory update that will ‘reduce battery capacity’ soon – and other Pixel phones could be next

HPE and Juniper confirm merger deal

Phil Spencer somehow thinks that Xbox has ‘never looked stronger’ as multiple games are canceled

LATEST ARTICLES

The Khadas Mind 2S is the ultra compact PC that packs in the power of a desktop – and I tested it

Quordle hints and answers for Friday, July 4 (game #1257)

NYT Connections hints and answers for Friday, July 4 (game #754)

NYT Strands hints and answers for Friday, July 4 (game #488)

I’ve tested 13 coffee makers over the last year, and these are the top 3 to keep you caffeinated on a budget

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

Contact Future’s experts

Terms and conditions

Privacy policy

Cookies policy

Advertise with us

Web notifications

Accessibility Statement

Future US, Inc. Full 7th Floor, 130 West 42nd Street,

Please login or signup to comment

Please wait…

Read More…