A new clandestine service named ATHR is changing the landscape of telephone fraud: it combines automation, artificial intelligence and, when necessary, human operators to run voice scams that extract credentials and verification codes with an efficiency that concerns researchers. According to the analysis of the Abnormal email security company, this platform makes available to criminals a complete telephone-oriented attack chain - from the initial e-mail decoy to voice interaction with the victim - and does so with tools that have traditionally been fragmented and manual.
The novelty is not only technical sophistication, but the "production" of fraud: For about $4,000 plus a commission on the stolen, a buyer in the underground forums can access specific e-mail templates by brand, supplanting mechanisms to make the message look legitimate and a control panel that orchestrates the campaign and delivers the data stolen in real time. Abnormal documents that, at the time of its research, ATHR offered templates for highly used services such as Google, Microsoft and several cryptomoneda platforms, including Coinbase and Binance; Yahoo and AOL also appeared.

The initial vector is usually a mail that appears to be a security alert or an account notification: something with enough urgency to push the user to call, but generic enough to mock content-based filters. When the victim marks the number included, the call is routed by systems such as Asterisk and WebRTC to voice agents. This is where the platform stands out: these agents can be IA models executed with carefully developed prompts to adopt the tone, behavior and script of a legitimate support team, with the option of transferring communication to a human operator if the conversation demands it.
In practice, the script seeks to reproduce legitimate processes, such as the verification or recovery of an account. In the case of Google accounts, attackers seek the victim to reveal a six-digit code that, out of context, is precisely the key to resetting access or completing verification processes. ATHR also incorporates tools to customize the message to each target and falsify mail headers, making it difficult to detect by conventional indicators.
The platform control board gives real-time visibility and control: From there we manage the mass sending of emails, the handling of calls and the recording of results per victim. This level of integration greatly reduces the amount of technical experience needed to mount a "viewing" operation, which, researchers warn, can multiply the frequency and scope of these attacks by making them accessible to less sophisticated actors.
The Abnormal research, which can be consulted in its technical report, details how automation covers the different phases of what the industry calls TOAD (telephone-oriented attack delivery), and why that represents a leap: when components no longer need to be mounted one by one, the low entry barrier and the scale becomes a real risk for organizations and individuals. You can read your report here: abnormal.ai - report on ATHR.
Generalist security media have already collected these findings and warned about the proliferation of similar platforms that sell fraud services as if they were legitimate software; an example of media coverage can be found in BleepingComputer which expands how these tools are marketed and operated.
In the face of such threats, traditional phishing signals - orthographic errors, strange domains or easy-to-detect mass messages - may not be enough, because the emails are designed to pass basic verifications and emulate legitimate headers. Therefore, specialists propose a different approach: to monitor and model the usual communication behavior within an organization to detect anomalies, for example several messages with the same pattern and a phone number in a short interval, or atypical interactions between sender and recipient. The IA-assisted detection capabilities focused on behavioral patterns can be warned before an employee gets to make the call.

It is also worth recalling practical measures that reduce risk: question the urgency of unexpected messages, avoid providing codes or passwords by phone, and verify any support requests through official channels - not those that appear in the suspicious mail itself. Consumer protection authorities and bodies offer resources and advice on telephone scams that are useful to the general public, for example the United States Federal Trade Commission maintains guidelines on how to recognize and act on telephone fraud: FTC - Phone scams and the Cyber Security Agency (CISA) publishes recommendations on social engineering and how to protect itself: CISA - Social engineering tips.
The progress that ATHR represents requires a rethinking of the defence: it is no longer sufficient to have tools to analyse the content of the mail; it is necessary to understand the context of the communications and to deploy controls that make it difficult for a temporary code or a verification data to serve as a passport to access critical resources. For companies this means strengthening multiple-channel verification procedures, educating employees about vishing techniques and considering technologies that can correlate events and detect abnormal patterns before a call occurs.
The emergence of platforms such as ATHR is not the end of history, but it is a call for attention: automation and IA are being incorporated into crime with the same logic of scale economy that drives legitimate developments. Understanding how these tools work, sharing intelligence between suppliers and strengthening individual and organizational digital hygiene are necessary steps to contain a threat that, by its very nature, feeds on misdirected trust and on the rush of day to day.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

malicious VS Code extensions: the attack that exposed 3,800 internal repositories
GitHub has confirmed that a device of an employee engaged by a malicious extension of Visual Studio Code allowed the exfiltration of hundreds or thousands of internal repositori...