INTEL-8: The Breach Starts With a Phone Call
Posted on March 27, 2026 • 3 min read • 597 wordsThe INTEL
The most expensive security infrastructure in your organization — email gateways, URL filters, sandbox detonation, attachment scanning — was built for a channel the adversary has already abandoned.
Mandiant’s M-Trends 2026, built on over 500,000 hours of frontline incident response across 83 campaigns and 73 countries, documents a shift that should fundamentally change how organizations think about initial access defense:
Email phishing has collapsed. From 22% of initial infection vectors in 2022 to just 6% in 2025 — a three-year decline of 73%.
Voice phishing has surged to 11% — nearly double email — making it the #2 initial infection vector behind only exploits. For cloud-specific investigations, the picture is even starker: voice phishing was #1 at 23%.
The cloud that organizations migrated to for better security is being breached primarily through phone calls.
UNC3944 (Scattered Spider) specifically researched help desk staff by name and role before calling, impersonating employees requesting password resets and MFA changes. The help desk — the function designed to restore access — became the function that granted it to adversaries.
UNC6040 ran a multi-phase operation: voice calls convinced targets to authorize attacker-controlled versions of legitimate SaaS applications. Months later, victims received ShinyHunters-branded extortion demands for data stolen during that initial compromise. The time gap between theft and extortion complicated attribution and response.
Your security architecture was designed to analyze bits. The adversary switched to voices.
Why It Matters
Organizations have spent decades and billions building layered defenses against digital threats — email security gateways, browser isolation, endpoint detection, network monitoring. These investments were correct for the threat model they addressed. But Mandiant’s data shows the adversary has identified the channel none of those controls cover.
A voice call bypasses every technical control in the stack. There’s no URL to scan. No attachment to detonate. No domain to block. No signature to match. The adversary adapts in real time to the target’s responses, something no phishing email can do.
The 23% figure for cloud compromises is particularly significant. Organizations that moved critical workloads to cloud platforms — often citing improved security as a driver — now face a reality where nearly one in four cloud breaches begins with someone picking up the phone.
What To Do
Implement mandatory out-of-band identity verification for all credential and MFA changes initiated by phone. Your help desk procedures were designed for a world where the caller was probably who they said they were. That world is gone. No password resets, MFA enrollments, or access changes should be completed based solely on a phone conversation — regardless of how much the caller knows about the employee they’re impersonating. A callback to a registered number, a push notification to a verified device, or an in-person verification must become the minimum standard. The adversary has already done the research on your help desk staff. Your procedures need to assume the caller is the adversary until proven otherwise.
MITRE ATT&CK
- T1566.004 — Phishing: Voice Phishing (Vishing): Social engineering via phone calls to obtain credentials and authorize malicious applications
- T1078 — Valid Accounts: Stolen credentials used for persistent access to cloud and SaaS platforms
- T1199 — Trusted Relationship: Exploitation of help desk trust relationships and SaaS application authorization flows
Learn More
- Mandiant M-Trends 2026 — Primary source
- FIR Risk Tuesday E85 — The Responder’s Report — Full M-Trends analysis
- FIR Risk Tuesday E83 — The Convergence — CrowdStrike on Scattered Spider
- FIR Risk Intelligence — Source prompts, methodology, and all published INTEL
Powered by FIR Risk Platform — AI-driven threat intelligence for enterprise risk leaders.