Scammers Use VoIP Numbers, Recycled Windows to Evade Cybersecurity Detection in Rising TOAD Campaigns

Scammers Exploit Short-Lived VoIP Numbers and Recycled Windows to Evade Detection

In the ever-evolving landscape of cyber threats, scammers are continually refining their tactics to bypass security measures and exploit unsuspecting victims. A recent trend involves the strategic use of Voice over Internet Protocol (VoIP) numbers and the recycling of Windows operating systems to circumvent reputation-based blocking mechanisms.

The Rise of Telephone-Oriented Attack Delivery (TOAD)

Traditionally, email-based scams relied heavily on malicious links or attachments to deceive recipients. However, cybercriminals are increasingly embedding phone numbers directly into emails, a method known as telephone-oriented attack delivery (TOAD). This approach encourages victims to initiate contact, thereby allowing scammers to manipulate them more effectively during live conversations.

Researchers at Cisco Talos have observed a significant uptick in TOAD campaigns. Their analysis, covering a period from late February to late March 2025, revealed that the largest scam operations predominantly utilized VoIP infrastructure. This shift underscores the adaptability of cybercriminals in leveraging new technologies to enhance the efficacy of their schemes.

VoIP: A Double-Edged Sword

VoIP technology offers numerous advantages, including cost-effectiveness and scalability. Unfortunately, these same features make it an attractive tool for scammers. By exploiting VoIP services, cybercriminals can rapidly acquire and discard phone numbers, effectively staying ahead of detection systems.

The process is alarmingly straightforward. Scammers utilize Communications-Platform-as-a-Service (CPaaS) providers to programmatically generate large blocks of sequential phone numbers. When a number is flagged or blocked, they simply rotate to the next in the sequence, a tactic known as sequential number grouping. This method ensures the continuity of their operations while evading detection.

During the study period, Cisco Talos identified that six of the ten largest scam campaigns relied entirely on VoIP infrastructure. Notably, Sinch emerged as the most commonly abused CPaaS provider. These platforms, designed for automation and high call volumes, inadvertently provide the perfect environment for large-scale scam operations.

Recycling Windows: A Stealthy Maneuver

In addition to exploiting VoIP numbers, scammers are also recycling Windows operating systems to further obfuscate their activities. By reusing Windows environments, they can maintain a semblance of legitimacy, making it more challenging for security systems to detect and block their operations.

This tactic involves setting up virtual machines or using cloud-based Windows instances that can be quickly deployed and discarded. By frequently changing these environments, scammers can avoid leaving a consistent digital footprint, thereby evading detection by traditional security measures.

The Implications for Cybersecurity

The combination of short-lived VoIP numbers and recycled Windows environments presents a formidable challenge for cybersecurity professionals. Traditional reputation-based blocking mechanisms are less effective against these tactics, as the transient nature of the resources used by scammers allows them to stay one step ahead.

To combat these evolving threats, organizations must adopt more dynamic and proactive security measures. This includes implementing advanced behavioral analysis to detect anomalies, enhancing user education to recognize and report suspicious activities, and collaborating with service providers to identify and mitigate abuse of their platforms.

Conclusion

As cybercriminals continue to innovate, leveraging technologies like VoIP and cloud-based environments to their advantage, it is imperative for the cybersecurity community to remain vigilant and adaptive. By understanding and anticipating these tactics, we can develop more effective strategies to protect individuals and organizations from these sophisticated scams.