Hackers target DocuSign with new phishing threat — watch out, you could be signing your data away

Electronic Signature
(Image credit: Shutterstock / Tada Images)

Hackers are stealing people’s DocuSign accounts to make their Business Email Compromise (BEC) attacks seem more authentic, and thus, more successful.

A report from cybersecurity researchers at Abnormal, say they observed an uptick in attacks looking to steal people’s DocuSign login credentials. 

As per the report, it all starts on a dark web forum, where a hacker creates, and then sells, credible-looking DocuSign notification email templates. These templates are picked up by other threat actors, which use them to try and trick people into attempting to view, or sign, an important document. That is when the attackers obtain the victims’ DocuSign login credentials which are then either sold back on the dark web, or used in the second stage of the attack.

Business email compromise

The second stage includes sifting through the documents found in the victim’s DocuSign account. People often store sensitive and confidential information there, so the hackers start looking for contracts, vendor agreements, or upcoming payment information. That way they can identify high-value targets and formulate the right type of approach for maximum efficiency. They often also look for compromising information which could be used in blackmail.

If the right type of information is found, the attackers will proceed to impersonate the company, send fake emails to business partners, clients, and similar, asking for some form of payment or fund transfer. To make the attack even more credible, the hackers will often add fake contracts through the compromised DocuSign account, and time the emails in such a way that it doesn’t raise too many alarms. 

As with any other phishing attack, the best way to defend is to be skeptical of incoming email, especially if they carry links, attachments, and a sense of urgency. Phishing emails often come from unrelated domains, so cross-checking the email address from which the message came is always a good place to start.

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Hacker Typing
This devious two-step phishing campaign uses Microsoft tools to bypass email security
Close up of a business person using a smartphone.
Watch out, malicious PDF files are being used again in phishing attacks
Someone checking their credit card details online.
Hackers use CAPTCHA scam in PDF files on Webflow CDN to get past security systems
An iPhone sitting on a wooden table
Millions at risk as malicious PDF files designed to steal your data are flooding SMS inboxes - how to stay safe
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft authentication system spoofed via phishing attack
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)