ATHR Platform Automates Voice Phishing Attacks with AI
A new cybercrime platform called ATHR is automating voice phishing (vishing) attacks by combining AI voice agents with human operators to steal credentials through fully automated telephone-oriented attack delivery (TOAD) chains.
How the ATHR Platform Works
ATHR streamlines the entire TOAD attack process, which begins with a deceptive email designed to appear as a legitimate security alert from trusted services like Google, Microsoft, or Coinbase. These emails contain only a phone number, avoiding traditional malicious links or attachments that might trigger email security filters.
When a recipient calls the number, they are connected through Asterisk and WebRTC infrastructure to either AI voice agents or human operators. The AI agents follow carefully crafted scripts that simulate official support interactions, guiding victims through fake account recovery processes to extract sensitive information such as six-digit verification codes.
The platform includes built-in tools for creating brand-specific email templates, managing call distribution, and monitoring attack outcomes in real time via a centralized dashboard. According to researchers at Abnormal Security, ATHR supports eight online services: Google, Microsoft, Coinbase, Binance, Gemini, Crypto.com, Yahoo, and AOL.
Role of AI in the Attack Chain
ATHR’s most concerning feature is its use of AI-driven voice agents that conduct social engineering without direct human involvement. These agents use natural language processing to respond dynamically to victim answers whereas adhering to predefined scripts that build urgency and legitimacy.
For example, when targeting a Google account, the AI agent may claim suspicious activity has been detected and walk the victim through a fabricated verification process, ultimately soliciting authentication codes under the guise of securing the account. This automation allows attackers to scale operations efficiently while reducing reliance on skilled human operators.
Availability and Pricing on Cybercrime Markets
ATHR is advertised on underground forums for a base price of $4,000, plus a 10% commission on profits generated from successful attacks. This pricing model lowers the technical barrier for conducting sophisticated vishing campaigns, enabling a broader range of cybercriminals to deploy TOAD attacks at scale.
The platform’s all-in-one design eliminates the need for criminals to separately assemble telephony infrastructure, phishing tools, and email delivery systems, which previously limited such attacks to more technically advanced groups.
Industry Response and Threat Significance
Security researchers warn that ATHR represents a significant evolution in social engineering threats as it bypasses conventional email defenses. Since the initial lure contains no malicious content, traditional secure email gateways often fail to flag it as suspicious.

Abnormal Security emphasizes that defeating such attacks requires a shift toward behavioral analysis and voice-based anomaly detection, as well as user education about the risks of calling numbers provided in unsolicited emails—even those that appear to originate from legitimate sources.
Conclusion
The emergence of platforms like ATHR underscores how artificial intelligence is being weaponized to automate and enhance cybercrime operations. By integrating AI voice agents into every stage of the attack chain—from initial contact to credential harvesting—ATHR increases the efficiency, scalability, and credibility of vishing attacks.
As these threats continue to evolve, organizations and individuals must adopt layered defenses that extend beyond email filtering to include call verification protocols, multi-factor authentication resistant to social engineering, and ongoing awareness training focused on voice-based manipulation tactics.