Businesses who interact with U.S. authorities were often targeted.
Attackers have increased the use of DocuSign as a phishing lure over the past two weeks.
According to SC US, DocuSign phishing URL utilisation increased by 98 percent over six days in November, compared with the entirety of September and October. According to a SlashNext Email Security report, one-fifth of the DocuSign phishing attacks during the two weeks involved the spoofing of U.S. government entities.
The researchers said these attacks were targeting businesses that regularly interact with state, municipal and licensing authorities in the United States.
“This sophisticated campaign is particularly dangerous because it exploits the trusted relationship between businesses and their regulatory bodies,” wrote the SlashNext researchers.
Written by
Dan Raywood
Senior Editor
SC Media UK
Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.
Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.