Header image

Phishing Messages Used DocuSign as a Lure

Emails claimed to require immediate review.

Attacks involving fraudulent DocuSign documents have been deployed to exfiltrate company executives' credentials as part of a new mobile phishing campaign.

According to Zimperium Labs, threat actors delivered malicious emails purporting to be DocuSign files requiring immediate review.

These were sent via a legitimate domain - clickme[.]thryv[.]com - a sales and marketing platform service used to obscure the attack’s origin. This linked to a compromised university website, leveraging the institution’s credibility to evade detection.

Research identified phishing activity originating from the same IP address, with the earliest record traced back to mid-May 2024. Analysis revealed that this IP was associated with phishing campaigns targeting well-known brands such as USPS and WhatsApp. 


Dan Raywood
Dan Raywood Senior Editor SC Media UK

Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.

Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood
Dan Raywood Senior Editor SC Media UK

Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.

Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

No events found.