DocuSign Phishing Campaign Uses COVID-19 as Bait
The newly discovered campaign lures victims with a supposed file concerning the coronavirus pandemic.
DocuSign users on Office 365 are the target of a new phishing campaign that features COVID-19 as a lure to convince them to offer up their credentials in return for pandemic information.
According to researchers at Abnormal Security, 50,000 to 60,000 DocuSign users have received the phishing email, which purports to be an automated message from DocuSign carrying a link to a COVID-related document. The malicious link to the document employs a three-level redirect to obfuscate the actual destination — a page that looks like a DocuSign login page. Once visitors are there, the attacker steals any entered credentials.
The campaign uses a combination of trust in DocuSign, increased use of the service because of the rise of working from home, and obfuscated URLs to create a malicious message that has the potential to be very effective.
For more, read here.
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really bad day" in cybersecurity. Click for more information and to register.
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024