DocuSign Phishing Campaign Uses COVID-19 as Bait

DocuSign Phishing Campaign Uses COVID-19 as Bait

The newly discovered campaign lures victims with a supposed file concerning the coronavirus pandemic.

DocuSign users on Office 365 are the target of a new phishing campaign that features COVID-19 as a lure to convince them to offer up their credentials in return for pandemic information.

According to researchers at Abnormal Security, 50,000 to 60,000 DocuSign users have received the phishing email, which purports to be an automated message from DocuSign carrying a link to a COVID-related document. The malicious link to the document employs a three-level redirect to obfuscate the actual destination — a page that looks like a DocuSign login page. Once visitors are there, the attacker steals any entered credentials.

The campaign uses a combination of trust in DocuSign, increased use of the service because of the rise of working from home, and obfuscated URLs to create a malicious message that has the potential to be very effective.

For more, read here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Recommended Reading:

DocuSign Phishing Campaign Uses COVID-19 as Bait

The newly discovered campaign lures victims with a supposed file concerning the coronavirus pandemic.

DocuSign users on Office 365 are the target of a new phishing campaign that features COVID-19 as a lure to convince them to offer up their credentials in return for pandemic information.

According to researchers at Abnormal Security, 50,000 to 60,000 DocuSign users have received the phishing email, which purports to be an automated message from DocuSign carrying a link to a COVID-related document. The malicious link to the document employs a three-level redirect to obfuscate the actual destination — a page that looks like a DocuSign login page. Once visitors are there, the attacker steals any entered credentials.

The campaign uses a combination of trust in DocuSign, increased use of the service because of the rise of working from home, and obfuscated URLs to create a malicious message that has the potential to be very effective.

For more, read here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Recommended Reading:

Leave a comment

Contact Us


    Please use this form to contact us or email us at [email protected]

    Address

    Singapore CBD

    Phone-no

    +65 8714 2780