What Is a Callback Scam?
On This Page
FAQs about callback scams
A callback scam is an attack where a victim is manipulated into calling a phone number controlled by a scammer. The attacker then impersonates tech support, a financial institution, or a government agency to steal money, install remote access software, or harvest credentials. The defining feature is that the victim makes the call—making it feel voluntary and therefore more trustworthy.
TOAD stands for Telephone Oriented Attack Delivery. It's a specific callback phishing technique where attackers send an email with no malicious links or attachments—just a phone number and a fake billing alert. Because there's nothing for email filters to flag, the message lands in the inbox. When the victim calls, the scammer delivers the actual attack: malware installation, credential theft, or the setup for a ransomware deployment. TOAD is how callback scams became a serious enterprise threat.
Vishing is any voice-based social engineering attack. In most vishing attacks, the attacker calls the victim. In a callback scam, the victim is manipulated into making the call themselves—through a missed call, a fake billing email, or an alarming voicemail. That reversal increases the victim's trust in whoever answers and reduces their suspicion that they're being targeted.
Act immediately. Disconnect any remote access sessions you granted. Contact your IT team or MSP and tell them exactly what happened and what instructions you followed. Change passwords for any accounts you mentioned or accessed during the call. If you provided payment information or purchased gift cards, contact your bank and the gift card issuer right away. The faster you report it, the more can be recovered.
Callback phishing emails typically contain no links and no attachments—just a PDF or plain text with a phone number. Email security tools scan for malicious URLs and file-based payloads. When there's nothing to scan, the email passes through. The entire attack runs through the phone call, which happens outside any automated security control.
A refund scam is a type of callback scam where the attacker convinces the victim that they're owed a refund. The victim is walked through installing a remote access tool so the scammer can "process" the refund. The scammer then stages a fake overpayment that only the victim can see—using browser tools to manipulate numbers on screen—and pressures them to return the difference via gift cards. No refund was ever coming. The goal was the remote access and the gift card payment.
Yes. Huntress Managed Security Awareness Training includes a Refund Scams episode that covers the callback scam playbook in detail—including how attackers use remote access tools to stage fake refunds and why gift cards are a universal scam red flag. The episode was developed from a real incident investigated by the Huntress SOC.
Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.