Emails claimed to require immediate review.
Attacks involving fraudulent DocuSign documents have been deployed to exfiltrate company executives' credentials as part of a new mobile phishing campaign.
According to Zimperium Labs, threat actors delivered malicious emails purporting to be DocuSign files requiring immediate review.
These were sent via a legitimate domain - clickme[.]thryv[.]com - a sales and marketing platform service used to obscure the attack’s origin. This linked to a compromised university website, leveraging the institution’s credibility to evade detection.
Research identified phishing activity originating from the same IP address, with the earliest record traced back to mid-May 2024. Analysis revealed that this IP was associated with phishing campaigns targeting well-known brands such as USPS and WhatsApp.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.