DocuSign Phishing Campaign Uses COVID-19 as Bait
The newly discovered campaign lures victims with a supposed file concerning the coronavirus pandemic.
DocuSign users on Office 365 are the target of a new phishing campaign that features COVID-19 as a lure to convince them to offer up their credentials in return for pandemic information.
According to researchers at Abnormal Security, 50,000 to 60,000 DocuSign users have received the phishing email, which purports to be an automated message from DocuSign carrying a link to a COVID-related document. The malicious link to the document employs a three-level redirect to obfuscate the actual destination — a page that looks like a DocuSign login page. Once visitors are there, the attacker steals any entered credentials.
The campaign uses a combination of trust in DocuSign, increased use of the service because of the rise of working from home, and obfuscated URLs to create a malicious message that has the potential to be very effective.
For more, read here.
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really bad day" in cybersecurity. Click for more information and to register.
About the Author
You May Also Like
Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024The Unreasonable Effectiveness of Inside Out Attack Surface Management
Dec 4, 2024