{"id":23409,"date":"2024-10-14T16:13:03","date_gmt":"2024-10-14T12:13:03","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/docusign-phishing-emails\/23409\/"},"modified":"2024-10-14T16:13:21","modified_gmt":"2024-10-14T12:13:21","slug":"docusign-phishing-emails","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/docusign-phishing-emails\/23409\/","title":{"rendered":"Phishing emails and Docusign electronic signature"},"content":{"rendered":"<p>Phishers are forever devising new tricks and finding new services to exploit and impersonate in their phishing campaigns. Today we talk about phishing emails that appear to come from Docusign, the world\u2019s most popular e-signature service.<\/p>\n<h2>How Docusign-themed phishing works<\/h2>\n<p>\nThe attack begins with an email, typically designed to resemble a legitimate Docusign communication. In this particular scheme, phishers don\u2019t generally bother meticulously forging or masking the sender address, because genuine Docusign emails can originate from any address due to the service\u2019s customization options.<\/p>\n<p>In most cases, the victim is notified that they need to electronically sign a document \u2014 usually a financial one \u2014 the exact purpose of which isn\u2019t entirely clear from the text of the email.<\/p>\n<div id=\"attachment_52423\" style=\"width: 887px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161108\/docusign-phishing-emails-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52423\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161108\/docusign-phishing-emails-1.jpg\" alt=\"Docusign-themed phishing email\" width=\"877\" height=\"675\" class=\"size-full wp-image-52423\"><\/a><p id=\"caption-attachment-52423\" class=\"wp-caption-text\">Example of a phishing email supposedly from Docusign: in this case, the link to the phishing page is located right in the body of the email<\/p><\/div>\n<p>In some cases, phishers employ an additional trick we\u2019ve covered in a <a href=\"https:\/\/www.kaspersky.com\/blog\/qr-codes-in-phishing-emails\/49388\/\" target=\"_blank\" rel=\"noopener nofollow\">separate post<\/a> before: the email contains a PDF attachment with a QR code inside.<\/p>\n<div id=\"attachment_52425\" style=\"width: 1367px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161127\/docusign-phishing-emails-2.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52425\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161127\/docusign-phishing-emails-2.jpg\" alt=\"Another Docusign-themed phishing email\" width=\"1357\" height=\"653\" class=\"size-full wp-image-52425\"><\/a><p id=\"caption-attachment-52425\" class=\"wp-caption-text\">Example of a phishing email supposedly from Docusign with a PDF attachment instead of a link<\/p><\/div>\n<p>The victim is prompted to scan this QR code \u2014 supposedly to access the document for signing. In reality, the QR code leads to a phishing website. This method tricks users into opening the malicious link not on their computers, but on their smartphones \u2014 where phishing URLs are harder to detect, and security software might not be installed.<\/p>\n<p>Sometimes the email doesn\u2019t mention Docusign at all. In one version of the PDF-with-QR-code scam, which we recently discussed in a <a href=\"https:\/\/www.kaspersky.com\/blog\/mass-phishing-with-spear-tricks\/52191\/\" target=\"_blank\" rel=\"noopener nofollow\">post about spearphishing techniques in mass emails<\/a>, only inside the PDF is Docusign mentioned.<\/p>\n<div id=\"attachment_52426\" style=\"width: 1605px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161151\/docusign-phishing-emails-3.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52426\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161151\/docusign-phishing-emails-3.jpg\" alt=\"Yet another Docusign-themed phishing PDF\" width=\"1595\" height=\"843\" class=\"size-full wp-image-52426\"><\/a><p id=\"caption-attachment-52426\" class=\"wp-caption-text\">Another example of a phishing PDF attachment with a link hidden in a QR code<\/p><\/div>\n<p>Sometimes the cybercriminals take care to replicate the appearance of a legitimate Docusign email \u2014 complete with a security code at the foot of the email:<\/p>\n<div id=\"attachment_52427\" style=\"width: 1517px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161208\/docusign-phishing-emails-4.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52427\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161208\/docusign-phishing-emails-4.jpg\" alt=\"Docusign-themed phishing email with a security code\" width=\"1507\" height=\"772\" class=\"size-full wp-image-52427\"><\/a><p id=\"caption-attachment-52427\" class=\"wp-caption-text\">High-quality fake Docusign email<\/p><\/div>\n<p>In some cases, phishers mimic Docusign integration with Microsoft SharePoint:<\/p>\n<div id=\"attachment_52428\" style=\"width: 921px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161227\/docusign-phishing-emails-5.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52428\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161227\/docusign-phishing-emails-5.jpg\" alt=\"Mimicking Docusign integration with Microsoft SharePoint\" width=\"911\" height=\"726\" class=\"size-full wp-image-52428\"><\/a><p id=\"caption-attachment-52428\" class=\"wp-caption-text\">Example of phishers mimicking Docusign integration with Microsoft SharePoint<\/p><\/div>\n<p>And in other cases, scam emails have nothing in common with the genuine ones. Here, for instance, the phishers were too lazy even to add the Docusign logo:<\/p>\n<div id=\"attachment_52429\" style=\"width: 1875px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161243\/docusign-phishing-emails-6.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52429\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161243\/docusign-phishing-emails-6.jpg\" alt=\"Phishing email without the Docusign logo\" width=\"1865\" height=\"701\" class=\"size-full wp-image-52429\"><\/a><p id=\"caption-attachment-52429\" class=\"wp-caption-text\">This phishing email doesn\u2019t even have the Docusign logo<\/p><\/div>\n<p>In short, the tactics and quality of execution can vary from email to email. However, the core principle remains the same: phishers rely on the recipient not understanding how e-signing with Docusign actually works.<\/p>\n<p>The inattentive victim follows the link (or QR code) to the phishing page and enters their work login credentials, which go straight to the attackers.<\/p>\n<p>Usernames and passwords harvested through successful phishing attacks are often compiled into databases sold on illicit dark web marketplaces, and later used to attack organizations.<\/p>\n<h2>How e-signing with Docusign actually works<\/h2>\n<p>\nThe actual process of signing a document with Docusign for the regular user is simplicity itself. You receive an email from the party requesting the signature \u2014 which contains an unmissable big yellow <em>Review Document<\/em> button.<\/p>\n<div id=\"attachment_52430\" style=\"width: 1504px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161258\/docusign-phishing-emails-7.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52430\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161258\/docusign-phishing-emails-7.jpeg\" alt=\"Genuine Docusign email\" width=\"1494\" height=\"230\" class=\"size-full wp-image-52430\"><\/a><p id=\"caption-attachment-52430\" class=\"wp-caption-text\">A genuine Docusign email looks something like this. <a href=\"https:\/\/support.docusign.com\/s\/articles\/How-do-I-sign-a-Docusign-document-Basic-Signing\" rel=\"nofollow noopener\" target=\"_blank\">Source<\/a><\/p><\/div>\n<p>Clicking this button redirects you through a unique link to the Docusign website (on the docusign.net domain). The page that opens displays a short message from the initiating party, flanked by a <em>Continue<\/em> button, similarly large and yellow.<\/p>\n<div id=\"attachment_52431\" style=\"width: 651px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161319\/docusign-phishing-emails-8.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52431\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/10\/14161319\/docusign-phishing-emails-8.jpeg\" alt=\"Document-signing page at Docusign.com\" width=\"641\" height=\"578\" class=\"size-full wp-image-52431\"><\/a><p id=\"caption-attachment-52431\" class=\"wp-caption-text\">Clicking the button in the email immediately opens the document-signing page at Docusign.com. <a href=\"https:\/\/support.docusign.com\/s\/articles\/How-do-I-sign-a-Docusign-document-Basic-Signing\" rel=\"nofollow noopener\" target=\"_blank\">Source<\/a><\/p><\/div>\n<p>The document for signing is available immediately \u2014 without entering any passwords. You simply review it, maybe add some details (such as name, date, and so on) in the appropriate fields, apply your signature, and click the <em>Finish<\/em> button (which is \u2014 you guessed it \u2014 also big and yellow). All done. No further actions required.<\/p>\n<p>Now for what Docusign will NEVER do:<\/p>\n<ul>\n<li>\n<strong>Send a PDF attachment with a link to a document to be signed.<\/strong> Bona fide Docusign notifications have no attachments, and display the <em>Review Document<\/em> button directly in the body of the email.<\/li>\n<li>\n<strong>Give you no choice but to scan a QR code.<\/strong> Docusign works on both mobile devices and computers, so a link is always provided to access the document \u2014 not a QR code.<\/li>\n<li>\n<strong>Require you to enter work login credentials.<\/strong> All the information Docusign needs is contained within the unique link sent in the email, so regular users aren\u2019t required to undergo authentication to sign a document.<\/li>\n<li>\n<strong>Force you to register with or log in to Docusign.<\/strong> <em>After<\/em> you sign the document, Docusign might suggest creating an account, but it\u2019s entirely optional.<\/li>\n<\/ul>\n<p>Remember that the whole purpose of Docusign is to make it as easy as possible for companies and individuals to exchange electronically-signed documents.<\/p>\n<p>Any additional steps or restrictions \u2014 such as creating an account, entering credentials, opening attachments, or using only a smartphone to sign \u2014 go against this principle. Therefore, Docusign asks for none of this and strives to make the signing process as quick and simple as possible.<\/p>\n<h2>How to guard against phishing<\/h2>\n<p>\nTo protect your organization from phishing attacks that impersonate Docusign or other popular services, consider the following measures:<\/p>\n<ul>\n<li>Filtering out suspicious and unwanted email at the gateway level \u2014 our comprehensive solution <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security for Mail Servers<\/a> will do this for you.<\/li>\n<li>Protecting endpoints from phishing redirects with <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Small Office Security<\/a> or <a href=\"https:\/\/me-en.kaspersky.com\/next?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____655fe72318f39647\" target=\"_blank\" rel=\"noopener\">Kaspersky Next<\/a> \u2014 depending on the size of your organization.<\/li>\n<li>Raising employee awareness of cyberthreats with specialized training. Such training is easy to deliver using our educational <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a>.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kaspersky-next\">\n","protected":false},"excerpt":{"rendered":"<p>Phishers have adopted another trick: they send emails pretending to be from Docusign with a fake link to a document that the recipient must sign. <\/p>\n","protected":false},"author":2598,"featured_media":23412,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917,1486],"tags":[1457,2790,19,76,2022,2659,521],"class_list":{"0":"post-23409","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"category-threats","11":"tag-business","12":"tag-docusign","13":"tag-email","14":"tag-phishing","15":"tag-sharepoint","16":"tag-signs-of-phishing","17":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/docusign-phishing-emails\/23409\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/docusign-phishing-emails\/28148\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/docusign-phishing-emails\/28302\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/docusign-phishing-emails\/38375\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/docusign-phishing-emails\/52420\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/docusign-phishing-emails\/34257\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/signs-of-phishing\/","name":"signs of phishing"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23409"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23409\/revisions"}],"predecessor-version":[{"id":23411,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23409\/revisions\/23411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23412"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}