en

Modern Phishing Campaigns Use PDF Files for Attacks

Modern Phishing Campaigns Use PDF Files for Attacks
Datami Newsroom
Datami Newsroom Datami Newsroom
Nov 24, 2025 3 min

Next-generation phishing attacks are actively disguising themselves as brands, abusing Microsoft 365 features, and even leveraging artificial intelligence. In 2025, companies are facing a wave of threats that are changing the rules of cybersecurity.

One of the key techniques is Telephone-Oriented Attack Delivery (TOAD). Victims receive a PDF with instructions to call a number controlled by attackers. During the call, fake Microsoft or PayPal support extracts data or persuades the victim to install malware. Such attacks create a sense of urgency and mimic real call centers, complete with spoofed Caller IDs and VoIP numbers.

PDF files are increasingly used as the primary tool for attacks. They may contain hidden URLs in notes, comments, or embedded QR codes that lead to fake login pages.

Sometimes legitimate links are also included, which increases the victim’s trust and makes detection harder. This is the approach used by the Luna Moth group, which employs VoIP numbers for multi-stage campaigns and remains invisible to security systems. The FBI warns that this technique is becoming a popular method of infiltrating corporate networks.

Microsoft 365 mail panel with a PDF file and warning icons.

A new attack vector has also emerged through the use of the legitimate Microsoft 365 Direct Send feature. It allows emails to be sent that appear as internal correspondence without compromising accounts. Since May 2025, at least 70 such attacks have been recorded. The messages usually mimic service notifications and contain PDFs with QR codes designed to harvest credentials.

Such campaigns are becoming multilayered and harder to detect, making continuous monitoring, employee training, and the advancement of protection technologies critically important.

free_consultation

Fill out the form below, and we’ll get in touch with you right away to discuss a plan to protect your business!

Updated: 24.11.2025
(0 assessments, average 0/5.0)

Related content

Datami at the Barcelona Cybersecurity Congress 2025: New Horizons in Cybersecurity Datami Newsroom
Datami Newsroom

Datami at the Barcelona Cybersecurity Congress 2025: New Horizons in Cybersecurity

Datami took part in the Barcelona Cybersecurity Congress 2025, one of Europe’s key events dedicated to cybersecurity innovations and technologies.

Jun 3, 2025
TOP 5 Largest Cryptocurrency Hacks in History Datami Newsroom
Datami Newsroom

TOP 5 Largest Cryptocurrency Hacks in History

The cryptocurrency industry is still in its formative stage, and its highly complex technologies are not always adequately protected. In addition, inexperienced users often make serious mistakes in securing their assets. This creates various opportunities

Jun 3, 2025 4 min
Top 10 Cyberattacks That Brought Global Corporations to a Halt Datami Newsroom
Datami Newsroom

Top 10 Cyberattacks That Brought Global Corporations to a Halt

Cyberattacks today pose a serious threat not only to individual users but also to global corporations. Criminals use increasingly sophisticated methods, causing companies billions in losses and disrupting the operation of critical systems.

Jun 17, 2025 3 min
Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s Datami Newsroom
Datami Newsroom

Cloudflare Repelled a Record DDoS Attack of 11.5 Tbit/s

Cloudflare reported that it stopped the most powerful UDP flood DDoS attack aimed at exhausting system resources. In 35 seconds, the attackers flooded the company with traffic at 11.5 Tbit/s.

Sep 5, 2025 2 min
Dangerous Calendar: A New Tool for Phishing Attacks Datami Newsroom
Datami Newsroom

Dangerous Calendar: A New Tool for Phishing Attacks

Did you know that an ordinary calendar can become a tool for a hacker attack? Google researchers discovered that the hacker group APT41 is using Google Calendar to send commands to infected systems.

Sep 2, 2025 3 min
Phishing is Evolving: What Are the Main Threats in 2025 and How to Counter Them Datami Newsroom
Datami Newsroom

Phishing is Evolving: What Are the Main Threats in 2025 and How to Counter Them

This method of digital deception has been known for several decades, yet it remains one of the most dangerous cyber threats for both individual users and companies. 75% of organizations worldwide encountered at least one phishing attempt.

Jun 20, 2025 3 min
Back to home page
Order a free consultation
We value your privacy
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie policy