<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=363521274148941&amp;ev=PageView&amp;noscript=1">
Blog

Cyderes Advisory

Staying Vigilant Against DocuSign Phishing Attacks

Article contributed by Ethan Fite

 

DocuSign, a trusted tool for secure document signing and sharing, has become a target for cybercriminals to launch phishing attacks.

These sophisticated attacks exploit the trust users place in official DocuSign emails, making them particularly dangerous. In this post, we’ll explore how these attacks work, the indicators of compromise (IOCs) to watch for, and actionable steps you can take to protect yourself and your organization.

The Anatomy of a DocuSign Phishing Attack
Phishing campaigns leveraging DocuSign are designed to deceive users by mimicking official DocuSign emails. These emails often look legitimate, coming from verified DocuSign domains such as dse_na4@docusign.net or dse_na3@docusign.net. They may include genuine-looking footers, complete with Alternate Signing Methods that DocuSign advises users to check for authenticity.

However, despite their appearance, these emails may contain malicious links leading to credential theft or malware downloads. The primary indicators of phishing attempts often lie in subtle details within the email headers or the email’s context, such as the “Reply-To” field or unexpected document requests.
 
 

Picture1-Jan-10-2025-03-28-23-9441-PM

 

Common Tactics Used in DocuSign Phishing Attacks

Attackers often use subject lines designed to create urgency or legitimacy. Examples include:

  • “Payment Advice Notification”
  • “Complete with DocuSign: Remittance Advice .pdf”
  • “ACH/EFT Deposited, Please review and sign”
  • “Reminder: Complete with DocuSign”

 

The sender’s email address may appear official, making it essential to verify other components like the email headers and signing methods. For spoofed emails, key red flags include:

1) Lack of an Alternate Signing Method: Official DocuSign emails always include an alternate method to sign documents. Its absence signals a potential spoof.

 

Picture2-4

 

2) SPF/DMARC Failures in Headers: If the IP address is not authorized to send emails on behalf of DocuSign, it indicates spoofing. These details are found in the email headers.

 

Picture3-3

 

3) Suspicious “Reply-To” Addresses: If the reply-to domain doesn’t align with your organization or trusted contacts, exercise caution.

 

Picture4-1

 

 

Examples of Malicious Senders and Domains

While the official DocuSign domains are legitimate, attackers may embed their malicious infrastructure into emails. Examples include:

  • wordpress@3foldtraining[.]com
  • accountreceivable4@NETORGFT5967304[.]onmicrosoft[.]com
  • ceo@cemcora[.]co
  • cod.docusign.prod@accenturefederal[.]com

These domains often hide behind official-looking DocuSign sender addresses to bypass suspicion.

 

How to Identify and Respond to Potential Attacks

To safeguard against these attacks, follow these best practices:

1) Be Skeptical of Unsolicited Emails: If you weren’t expecting a DocuSign request, treat the email as suspicious until verified.

2) Check for Alternate Signing Methods: Legitimate DocuSign emails always include this feature in the footer.

3) Inspect Email Headers: Look for SPF and DMARC validation to confirm the sender’s authenticity.

4) Review the Reply-To Field: Ensure it aligns with a trusted domain or contact.

5) When in Doubt, Report the Email: If you suspect an email is malicious, escalate it to your organization’s security team.

 

Summary

DocuSign phishing attacks exploit the platform’s widespread use and reputation for secure document management. By understanding the tactics used in these attacks and staying vigilant, you can protect yourself and your organization from falling victim.

Remember, cybercriminals rely on human error. Being cautious, verifying suspicious emails, and leveraging your security team’s expertise are the best defenses against these threats.

Stay alert, stay informed, and stay safe!

 

Resources for Further Reading

DocuSign Trust Center

How to Spot a Phishing Email

 


Ready to put these insights into practice and improve your ongoing security posture?

 

For more cybersecurity tips, follow Cyderes on LinkedIn and X.