{"id":25312,"date":"2025-07-03T13:27:54","date_gmt":"2025-07-03T13:27:54","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=25312"},"modified":"2026-01-24T22:52:52","modified_gmt":"2026-01-24T22:52:52","slug":"the-pdf-trap-how-callback-phishing-attacks-work","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work","title":{"rendered":"The PDF Trap: How Callback Phishing Attacks Work"},"content":{"rendered":"\n<p>Remember when the biggest worry about PDFs was whether they&#8217;d format correctly when you printed them? Unfortunately, those days are long gone. Cybercriminals are weaponizing one of the most trusted file formats in business, turning innocent-looking PDFs into phishing weapons.<\/p>\n\n\n\n<p>Research from Cisco Talos <a href=\"https:\/\/blog.talosintelligence.com\/pdfs-portable-documents-or-perfect-deliveries-for-phish\/\" target=\"_blank\" rel=\"noopener\" title=\"\">reveals a troubling trend<\/a>: attackers are increasingly using PDF attachments to impersonate trusted brands like Microsoft, DocuSign, PayPal, and Geek Squad in what&#8217;s known as Telephone-Oriented Attack Delivery (TOAD) or callback phishing campaigns.<\/p>\n\n\n\n<p>Unlike traditional phishing that tries to steal credentials through malicious links, these attacks take a different approach: they convince you to pick up the phone.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Makes PDF Phishing So Effective?<\/h2>\n\n\n\n<p>The brilliance (and danger) of PDF-based phishing lies in its psychological manipulation. PDFs feel safe. They&#8217;re everywhere in business communication, from invoices to contracts to official notices. When you see a PDF attachment from what appears to be Microsoft or your antivirus provider, your guard naturally drops.<\/p>\n\n\n\n<p>These attacks leverage brand impersonation as one of the most popular social engineering techniques, with threat actors often using Voice over Internet Protocol (VoIP) to remain anonymous. The PDF is crafted to trigger urgency and fear, often claiming your account is compromised, your subscription is about to renew, or immediate action is required.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Anatomy of a Modern PDF Phishing Attack<\/h2>\n\n\n\n<p>Here&#8217;s how these campaigns typically unfold:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Step 1: The Delivery<\/h3>\n\n\n\n<p>You receive an email with a PDF attachment that looks like it&#8217;s from a company you know and trust. The branding is spot-on, the language feels authentic, and the sense of urgency is carefully calibrated.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Step 2: The Hook<\/h3>\n\n\n\n<p>The PDF contains alarming information: &#8220;Your Microsoft 365 account has been compromised&#8221; or &#8220;Your GeekSquad subscription will auto-renew for $299.99.&#8221; But instead of asking you to click a link, it provides a phone number to call &#8220;immediately.&#8221;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Step 3: The Conversation<\/h3>\n\n\n\n<p>When you call, you&#8217;re connected to someone who sounds professional and knowledgeable. They know just enough about the brand they&#8217;re impersonating to seem legitimate. This live interaction enables attackers to manipulate the victim&#8217;s emotions and responses by employing <a href=\"\/en\/blogs\/dont-get-hooked-10-social-engineering-indicators\" target=\"_blank\" rel=\"noopener\" title=\"\">social engineering tactics<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Step 4: The Payload<\/h3>\n\n\n\n<p>During the call, the attacker guides you to download remote access software like TeamViewer or AnyDesk &#8220;to fix the problem.&#8221; Once they have access to your computer, they can steal credentials, install malware, or even initiate financial transfers.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"572\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-1-1024x572.jpg\" alt=\"\" class=\"wp-image-25313\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-1-1024x572.jpg 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-1-300x167.jpg 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-1-768x429.jpg 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-1-1536x857.jpg 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-1-2048x1143.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The Most Targeted Brands<\/h2>\n\n\n\n<p>Analysis of phishing emails with PDF attachments between May and June 2025 revealed <a href=\"https:\/\/thehackernews.com\/2025\/07\/hackers-using-pdfs-to-impersonate.html\" target=\"_blank\" rel=\"noopener\" title=\"\">Microsoft and DocuSign as the most impersonated brands<\/a>, with NortonLifeLock, PayPal, and Geek Squad among the most impersonated brands in TOAD emails. These brands are attractive targets because:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>They have massive user bases<\/li>\n\n\n\n<li>They regularly send legitimate security notifications<\/li>\n\n\n\n<li>Users expect to receive urgent communications from them<\/li>\n\n\n\n<li>They offer services that people are willing to pay to protect<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">QR Codes: The New Frontier<\/h2>\n\n\n\n<p>The latest evolution in PDF phishing involves QR codes embedded within the documents. These codes might be hidden in PDF annotations, sticky notes, or form fields, making them harder for automated security systems to detect. One recent example involved a phishing email that resembled a voicemail notification and included a PDF attachment containing a QR code directing recipients to a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-365-direct-send-abused-to-send-phishing-as-internal-users\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Microsoft 365 credentials harvesting page<\/a>.<\/p>\n\n\n\n<p>QR codes are particularly dangerous because they bypass many traditional security measures. When you scan a code with your phone, you&#8217;re often not on your corporate network or protected by the same security tools that might catch a malicious link in an email.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Microsoft 365 Direct Send Problem<\/h2>\n\n\n\n<p>Recent campaigns have found a new vulnerability to exploit: Microsoft 365&#8217;s Direct Send feature, which has been used to target more than 70 organizations since May 2025, allowing attackers to spoof internal users and deliver phishing emails without compromising an account. This makes the emails appear to come from inside the victim&#8217;s organization, significantly increasing their apparent legitimacy.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"572\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-2-1-1024x572.jpg\" alt=\"\" class=\"wp-image-25353\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-2-1-1024x572.jpg 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-2-1-300x167.jpg 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-2-1-768x429.jpg 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-2-1-1536x857.jpg 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/inline-2-1-2048x1143.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Protecting Your Organization<\/h2>\n\n\n\n<p>The rise of PDF-based callback phishing requires a multi-layered defense strategy:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Email Security<\/h3>\n\n\n\n<p>Implement advanced email filtering that can analyze PDF contents, not just scan for known malicious attachments. Look for solutions that can detect brand impersonation and suspicious callback numbers within documents.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">User Education<\/h3>\n\n\n\n<p>Train your team to be skeptical of urgent communications, especially those requesting phone calls. Establish clear policies about when legitimate vendors might call and how they would authenticate themselves.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Access Controls<\/h3>\n\n\n\n<p>This is where robust privilege management becomes critical. Even if an attacker tricks someone into calling them, proper access controls can limit the damage. <a href=\"\/en\/endpoint-privilege-management\" target=\"_blank\" rel=\"noopener\" title=\"\">Admin By Request&#8217;s EPM solution<\/a> ensures that even if malware gets onto a system, it can&#8217;t automatically gain administrative privileges to cause widespread damage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Verification Procedures<\/h3>\n\n\n\n<p>Establish out-of-band verification procedures. If someone calls claiming to be from Microsoft, hang up and call Microsoft directly using a number you find independently (not one provided in the email or by the caller).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Bottom Line<\/h2>\n\n\n\n<p>PDF-based callback phishing represents a concerning development in social engineering attacks. By combining the trusted nature of PDF documents with the psychological pressure of live phone interaction, attackers are finding new ways to bypass both technical defenses and human intuition.<\/p>\n\n\n\n<p>Remember: legitimate companies don&#8217;t operate with the urgency that these scammers try to create. If something feels too urgent, too alarming, or too convenient, it probably is. When in doubt, verify through official channels, and never let anyone you don&#8217;t know access your computer remotely.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PDF phishing is on the rise. Learn how attackers use trusted documents and fake phone numbers to bypass defenses in callback phishing campaigns.<\/p>\n","protected":false},"author":16,"featured_media":25317,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[148,67,481,371,68,434],"ppma_author":[428],"class_list":["post-25312","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-cybersecurity","tag-pam","tag-pdf-phishing","tag-phishing","tag-privileged-access-management","tag-social-engineering","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"PDF phishing is on the rise. Learn how attackers use trusted documents and fake phone numbers to bypass defenses in callback phishing campaigns.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"Pocholo Legaspi\"\/>\n\t<meta name=\"keywords\" content=\"cybersecurity,pam,pdf phishing,phishing,privileged access management,social engineering\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"The PDF Trap: How Callback Phishing Attacks Work\" \/>\n\t\t<meta property=\"og:description\" content=\"PDF phishing is on the rise. Learn how attackers use trusted documents and fake phone numbers to bypass defenses in callback phishing campaigns.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-07-03T13:27:54+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-24T22:52:52+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"The PDF Trap: How Callback Phishing Attacks Work\" \/>\n\t\t<meta name=\"twitter:description\" content=\"PDF phishing is on the rise. Learn how attackers use trusted documents and fake phone numbers to bypass defenses in callback phishing campaigns.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work#blogposting\",\"name\":\"The PDF Trap: How Callback Phishing Attacks Work\",\"headline\":\"The PDF Trap: How Callback Phishing Attacks Work\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/main-scaled.jpg\",\"width\":2560,\"height\":1429,\"caption\":\"Admin By Request blog post on PDF phishing\"},\"datePublished\":\"2025-07-03T13:27:54+00:00\",\"dateModified\":\"2026-01-24T22:52:52+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work#webpage\"},\"articleSection\":\"Blogs, Cybersecurity, PAM, PDF Phishing, Phishing, Privileged Access Management, Social Engineering, Pocholo Legaspi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work#listItem\",\"name\":\"The PDF Trap: How Callback Phishing Attacks Work\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work#listItem\",\"position\":3,\"name\":\"The PDF Trap: How Callback Phishing Attacks Work\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor\",\"name\":\"Pocholo Legaspi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work\",\"name\":\"The PDF Trap: How Callback Phishing Attacks Work\",\"description\":\"PDF phishing is on the rise. Learn how attackers use trusted documents and fake phone numbers to bypass defenses in callback phishing campaigns.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/main-scaled.jpg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work\\\/#mainImage\",\"width\":2560,\"height\":1429,\"caption\":\"Admin By Request blog post on PDF phishing\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-pdf-trap-how-callback-phishing-attacks-work#mainImage\"},\"datePublished\":\"2025-07-03T13:27:54+00:00\",\"dateModified\":\"2026-01-24T22:52:52+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>The PDF Trap: How Callback Phishing Attacks Work<\/title>\n\n","aioseo_head_json":{"title":"The PDF Trap: How Callback Phishing Attacks Work","description":"PDF phishing is on the rise. Learn how attackers use trusted documents and fake phone numbers to bypass defenses in callback phishing campaigns.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"cybersecurity,pam,pdf phishing,phishing,privileged access management,social engineering","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work#blogposting","name":"The PDF Trap: How Callback Phishing Attacks Work","headline":"The PDF Trap: How Callback Phishing Attacks Work","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/main-scaled.jpg","width":2560,"height":1429,"caption":"Admin By Request blog post on PDF phishing"},"datePublished":"2025-07-03T13:27:54+00:00","dateModified":"2026-01-24T22:52:52+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work#webpage"},"articleSection":"Blogs, Cybersecurity, PAM, PDF Phishing, Phishing, Privileged Access Management, Social Engineering, Pocholo Legaspi"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work#listItem","name":"The PDF Trap: How Callback Phishing Attacks Work"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work#listItem","position":3,"name":"The PDF Trap: How Callback Phishing Attacks Work","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor","name":"Pocholo Legaspi"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work","name":"The PDF Trap: How Callback Phishing Attacks Work","description":"PDF phishing is on the rise. Learn how attackers use trusted documents and fake phone numbers to bypass defenses in callback phishing campaigns.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/07\/main-scaled.jpg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work\/#mainImage","width":2560,"height":1429,"caption":"Admin By Request blog post on PDF phishing"},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work#mainImage"},"datePublished":"2025-07-03T13:27:54+00:00","dateModified":"2026-01-24T22:52:52+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"The PDF Trap: How Callback Phishing Attacks Work","og:description":"PDF phishing is on the rise. Learn how attackers use trusted documents and fake phone numbers to bypass defenses in callback phishing campaigns.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2025-07-03T13:27:54+00:00","article:modified_time":"2026-01-24T22:52:52+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"The PDF Trap: How Callback Phishing Attacks Work","twitter:description":"PDF phishing is on the rise. Learn how attackers use trusted documents and fake phone numbers to bypass defenses in callback phishing campaigns.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"25312","title":"#post_title","description":"#post_excerpt","keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-24 23:55:16","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2025-07-04 13:27:55","updated":"2026-01-24 23:55:16"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tThe PDF Trap: How Callback Phishing Attacks Work\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"The PDF Trap: How Callback Phishing Attacks Work","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-pdf-trap-how-callback-phishing-attacks-work"}],"authors":[{"term_id":428,"user_id":16,"is_guest":0,"slug":"pocholo-editor","display_name":"Pocholo Legaspi","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg"},"author_category":"1","user_url":"","last_name":"Legaspi","first_name":"Pocholo","job_title":"","description":"Pocholo Legaspi is a seasoned content marketer and SEO specialist with over nine years of experience crafting digital content that drives engagement and growth. With a background in tech and a Master\u2019s in Business Informatics, he brings a data-driven approach to content strategy and storytelling."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/25312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=25312"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/25312\/revisions"}],"predecessor-version":[{"id":25355,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/25312\/revisions\/25355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/25317"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=25312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=25312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=25312"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=25312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}