The electronic signature company issued an update alert today that it noticed a rise in phishing attacks last week and this morning.
DocuSign has posted an update alert that a phishing attack launched last week using a bogus version of its brand continues to spread today.
The spoofed-DocuSign branded emails contain a nefarious Word attachment. The malicious software steals email addresses, but doesn't take names, physical addresses, passwords, social security numbers, credit card data, or other information, DocuSign stated in its blog post.
DocuSign said only its non-core system that allow the company to send out email announcements to customers was breached, and that its core eSignature service, envelopes, and documents remain secure.
Users should delete any emails with subject lines that read: "Completed: [domain name] – Wire transfer for recipient-name Document Ready for Signature” and “Completed [domain name/email address] – Accounting Invoice [Number] Document Ready for Signature," the company stated. DocuSign also advised users to be on the lookout for emails that contain misspellings like "docusgn.com" without an "i," or @docus.com.
Read more about the DocuSign phishing attack here.
About the Author(s)
You May Also Like
The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024