1,400 Evasion Combinations — StrongestLayer
StrongestLayer Threat Research · December 2025 – February 2026

1,400 ways
attackers beat
your email security

We analyzed 5,000 phishing attacks that bypassed enterprise SEGs. Not one-trick attacks — a mature evasion ecosystem where attackers engineer multi-technique architectures to defeat the specific stack they're targeting.

4.11 avg. techniques per attack
34.7% score 7+/10 regex difficulty
130% increase from prior study

22 techniques. 5 categories. 1,400+ unique combinations.

Every evasion technique serves one of three roles: it shifts the attack channel, obfuscates the payload, or exploits human psychology. Attackers don't pick one—they stack them.

27.9%
Channel-Shifting
Moves the attack off the email plane entirely, rendering email-only detection structurally blind.
Phone Callback (TOAD) · QR Code · Voicemail Pivot
43.0%
URL Evasion
Launders malicious URLs through legitimate infrastructure or actively blocks automated scanning.
Legitimate Redirect · CAPTCHA Gate · Multi-hop Redirect · Encoded URL
20.3%
Content Evasion
Hosts payloads on trusted platforms with perfect reputation scores no SEG will block.
LOTS Hosting · PDF Attachment · Image-based Payload · Notification Spoofing
0.5%
Auth Evasion
Exploits authentication trust—OAuth tokens, SSO flows, and session hijacking.
Authentication Exploitation · Collaboration Platform Spoofing
65.5%
Social Engineering
Vocabulary identical to legitimate business communication. Detection cost exceeds miss cost.
Authority Impersonation · Domain Lookalike · Financial Lure · Brand Impersonation

Technique Stacking: The End of One-Trick Attacks

Only 9.1% of detections use a single technique or none. The average attack stacks 4.11 techniques simultaneously. 56.8% use four or more.

2.3%
0–1
6.8%
2
16.1%
3
18.0%
4
24.2%
5
18.5%
6
9.5%
7
4.6%
8–11

Techniques per detection · Pink bars = 5+ techniques (56.8% of all detections)

Source: StrongestLayer Threat Research · ~5,000 email-based threat detections · Dec 2025 – Feb 2026. All detections bypassed upstream SEGs.

The #1 attack family has no scannable payload

27.8%
TOAD — Telephone-Oriented Attack Delivery
More than 1 in 4 emails use a phone number as the payload. No URL. No attachment. No technically malicious content. A call center staffed by social engineers does the rest — outside the detection model email security was designed for.
TOAD showed a ~487% increase from December to January 2026 — a structural shift in how attackers deliver social engineering.
13.2%
Branded Financial Callback
Norton, McAfee, PayPal — specific dollar amounts feel transactional, not fabricated.
9.1%
Financial Callback (No Brand)
Generic payment themes. Harder for brand-matching rules to catch.
4.3%
Generic Callback
No financial or brand signals. Pure social engineering.
1.1%
Notification Callback
Mimics automated billing systems—format itself conveys authority.
TOAD categorization validated against published research from Proofpoint, Trustwave SpiderLabs, Intel 471, and Cisco Talos.

The three-layer evasion architecture

The most sophisticated attacks construct a layered architecture where each layer defeats a different detection capability. The combination creates a detection gap that compounds multiplicatively.

1
Trusted Delivery
Email arrives through legitimate infrastructure — SendGrid, Google Calendar, SharePoint links, or google.com redirects.
Reputation-based filtering defeated. Perfect reputation scores no SEG will block.
2
Anti-Scanner
Payload protected by CAPTCHA gates, encoded in QR codes inside PDFs, or delivered as image-based payloads.
Sandbox analysis defeated. SEG follows the URL, hits a CAPTCHA, and marks it "clean."
3
Channel Shift
Exploitation moves off-email — to a phone call (TOAD), mobile device (QR), Teams meeting, or SMS.
Post-delivery remediation defeated. Damage occurs in a channel the SEG cannot monitor.
35.9% of all detections fall into structural blind spots — attack categories where SEG detection is not merely difficult but architecturally impossible within an email-text-scanning paradigm. TOAD accounts for 27.8%, QR Code attacks for 6.0%, and Voice Channel Shift for 2.1%.

Attack families ranked by evasion strategy

Classified by primary evasion strategy, not raw technique count. A TOAD attack with 2 techniques is harder for a SEG to detect than a redirect chain with 6, because the TOAD payload is structurally unblockable.

Super-Family % of Total SEG Detection Difficulty
TOAD / Phone Callback 27.8% Structural blind spot
Redirect Chain Families 27.4% Hard (evasion-dependent)
Legitimate Infrastructure (LOTS) 16.7% Hard (reputation-laundered)
Social Engineering Pure-Play 14.0% Medium-hard (high FP cost)
QR Code Attack Families 6.0% Structural blind spot
Voice Channel Shift 2.1% Structural blind spot
Content Evasion 2.0% Medium
Collaboration Platform Spoofing 0.7% Hard
Authentication Exploitation 0.5% Very hard

Attackers adapt to your security stack

Evasion profiles are not random. Microsoft environments face image-based payload attacks; Google Workspace faces notification spoofing and voicemail pivots. Attackers are optimizing for the detection gaps of specific platform architectures.

Microsoft Environments
QR Code11–53%
PDF Attachment21–43%
Multi-hop Redirect17–48%
CAPTCHA Gate15–38%
Legitimate Redirect37–60%
Notification Spoofing25–44%
Google Workspace
Notification Spoofing31–59%
Authority Impersonation78–82%
Domain Lookalike66–77%
Legitimate Redirect37–66%
CAPTCHA Gate15–44%
Voicemail Pivot10–34%
The Platform Divide: Microsoft faces image-based attacks — QR codes up to 53%, PDF attachments up to 43%. Google Workspace faces spoofed notifications up to 59%, voicemail pivots up to 34%. Attackers adapt evasion profiles to each platform's architecture.
Ranges reflect variation across environments. Sample sizes are small; patterns are directional.
Talk To Us

Don’t let legacy tools leave you exposed.

Tomorrow's Threats. Stopped Today.