A slight saving grace is that, in both cases, cybercriminals must already have access to a compromised set of credentials. Unfortunately, when it comes to TOAD attacks, all they need is a victim’s phone number.
The target phone receives a fake invoice or time-sensitive alert, compelling them to call a customer service number for more information. Once on the line, they are issued further instructions, usually to download malware, sign in to an account via a spoofed page, enable remote access or transfer money.
As this style of attack puts cybercriminals in direct contact with potential victims, and doesn’t rely on the intermediary of malware or a malicious URL to be clicked, security awareness and education is the only thing standing in the way of account compromise and a raft of subsequent threats.