DocuSign Phishing Campaign Uses COVID-19 as Bait

The newly discovered campaign lures victims with a supposed file concerning the coronavirus pandemic.

Dark Reading Staff, Dark Reading

May 8, 2020

1 Min Read
Dark Reading logo in a gray background | Dark Reading

DocuSign users on Office 365 are the target of a new phishing campaign that features COVID-19 as a lure to convince them to offer up their credentials in return for pandemic information.

According to researchers at Abnormal Security, 50,000 to 60,000 DocuSign users have received the phishing email, which purports to be an automated message from DocuSign carrying a link to a COVID-related document. The malicious link to the document employs a three-level redirect to obfuscate the actual destination — a page that looks like a DocuSign login page. Once visitors are there, the attacker steals any entered credentials.

The campaign uses a combination of trust in DocuSign, increased use of the service because of the rise of working from home, and obfuscated URLs to create a malicious message that has the potential to be very effective.

For more, read here.

VIRTUALSUMMIT_DR20_320x50.jpg

 

 

 

 

Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really  bad day" in cybersecurity. Click for more information and to register

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights