<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Twilio — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/twilio/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 10:01:45 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/twilio/feed.xml" rel="self" type="application/rss+xml"/><item><title>Phone Number Reuse in Scam Email Campaigns</title><link>https://feed.craftedsignal.io/briefs/2026-05-phone-number-scams/</link><pubDate>Wed, 06 May 2026 10:01:45 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-phone-number-scams/</guid><description>Talos has begun tracking phone numbers in emails as indicators of compromise, revealing insights into their reuse in scam campaigns where attackers use API-driven VoIP services for cost-effective operations, rotating phone number blocks to evade security filters, and maximizing reach by recycling numbers across diverse lures.</description><content:encoded><![CDATA[<p>Talos has started collecting intelligence around phone numbers within emails as an additional indicator of compromise. Their analysis of scam campaigns between February 26 and March 31, 2026, reveals the prevalence of phone number reuse, especially with VoIP numbers due to their ease of acquisition and difficulty of tracing. Attackers use VoIP providers, particularly CPaaS platforms like Sinch, for rapid, API-driven number provisioning. They rotate through sequential blocks of phone numbers with a median lifespan of 14 days to evade reputation-based security filters. This allows them to maintain operational continuity and project a consistent brand presence. Attackers also recycle phone numbers across diverse lures, including varied subject lines and different attachment formats like HEIC and PDF, to impersonate multiple brands simultaneously, like PayPal, Geek Squad, McAfee and Norton LifeLock.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial email sent to victim with a lure impersonating a known brand (e.g., PayPal, Geek Squad).</li>
<li>The email contains a phone number, often a VoIP number, directing the recipient to call.</li>
<li>Victim calls the provided phone number.</li>
<li>Attacker, posing as customer service or technical support, engages the victim in a real-time conversation.</li>
<li>Attacker manipulates the victim into disclosing sensitive information (e.g., financial details, personal data).</li>
<li>Alternatively, the attacker persuades the victim to install malicious software under the guise of legitimate software updates or security tools.</li>
<li>If malware is installed, attacker gains remote access or control over the victim&rsquo;s device.</li>
<li>Attacker uses stolen information for financial gain or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Scam campaigns utilizing phone numbers in emails can lead to significant financial losses and data breaches for victims. The abuse of VoIP services enables attackers to operate cost-effectively and at scale.  While the exact number of victims is not specified, the report highlights the widespread use of this tactic and the potential for substantial impact across various sectors, targeting brands like PayPal, Geek Squad (Best Buy), McAfee, and Norton LifeLock. If the attack succeeds, victims may experience identity theft, financial fraud, and compromise of their devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor email traffic for the presence of phone numbers, particularly those associated with VoIP providers like Sinch, using the IOCs provided.</li>
<li>Implement the provided Sigma rules to detect suspicious email patterns and phone number usage.</li>
<li>Block known malicious phone numbers identified in scam campaigns at the telecom provider level.</li>
<li>Educate users about Telephone-Oriented Attack Delivery (TOAD) and the risks associated with calling phone numbers provided in unsolicited emails.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>email</category><category>phishing</category><category>voip</category><category>scam</category></item></channel></rss>