DocuSign has posted an update alert that a phishing attack launched last week using a bogus version of its brand continues to spread today.
The spoofed-DocuSign branded emails contain a nefarious Word attachment. The malicious software steals email addresses, but doesn’t take names, physical addresses, passwords, social security numbers, credit card data, or other information, DocuSign stated in its blog post.
DocuSign said only its non-core system that allow the company to send out email announcements to customers was breached, and that its core eSignature service, envelopes, and documents remain secure.
Users should delete any emails with subject lines that read: “Completed: [domain name] – Wire transfer for recipient-name Document Ready for Signature” and “Completed [domain name/email address] – Accounting Invoice [Number] Document Ready for Signature,” the company stated. DocuSign also advised users to be on the lookout for emails that contain misspellings like “docusgn.com” without an “i,” or @docus.com.
Read more about the DocuSign phishing attack here.
Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio