Everything On DocuSign Phishing Attacks in 3 Minutes
- by Brittany Day
Office 365 email risk is greater than ever. Cybercriminals are exploiting remote workers’ increased reliance on cloud email, misconfigured cloud platforms and heightened anxieties surrounding COVID-19 to steal users’ credentials and compromise accounts. Learn about the serious threat that DocuSign phishing poses to Office 365 users, alerts about DocuSign Phishing and how you can protect yourself in this quick, informative read.
How A DocuSign Phishing Scam Works
Threat actors are upping their attack game in Office 365 - employing sophisticated tactics such as impersonating DocuSign email notifications to steal employees’ credentials, which can be used to access important business documents. In such an attack, a user receives a fraudulent email mimicking the content seen in legitimate emails sent by Docusign to notify a user that there is a document ready for them to review. The phony email contains a malicious payload link concealed in text and hosted via multiple redirects designed to confuse victims, and to bypass simple URL detection in emails that aren’t able to crawl numerous redirects. If a victim falls for such a scam, his or her DocuSign login credentials and business email account credentials, as well as any sensitive information stored on these accounts, are compromised.
Some Notable Stats
- According to the FBI, 30% of phishing attacks make it through existing systems and are opened by target users.
- Osterman Research reports that despite existing protection, 40% of Office 365 users have experienced credential theft nevertheless.
- During the month of May of 2020 Guardian Digital EnGarde Cloud Email Security identified more phishing emails targeting cloud email users than in any month prior since the company’s inception in 1999.
How To Stay Safe in Office 365
Implement a threat-ready, fully-managed cloud email security solution that seamlessly complements Microsoft’s insufficient default protection, providing the critical additional layers of security that Office 365 lacks. Defense-in-depth is crucial in fortifying cloud email against today’s advanced threats.
We provide additional tips and advice for staying safe online while working remotely in a recent blog post.
The Bottom Line
With an increase in complex attacks targeting cloud email users, it is more critical than ever to ensure that remote workers are protected in Office 365. Office 365 default security alone is alarmingly insufficient in safeguarding users, and conventional security solutions are no longer able to keep pace with attackers' sophisticated tactics. A comprehensive, multi-layered approach to email security is needed to fortify Office 365 email against DocuSign phishing scams and other emerging exploits.
Download our free eGuide to learn more about protecting users in Office 365.
- Thinking Strategically about Email Security in 2021 and Beyond
- Behind the Shield: EnGarde Cloud Email Security Explained
- Open Source: A Powerful, Yet Underutilized Weapon against Phishing & Zero-Day Attacks
- Buyer's Guide: What to Prioritize in an Email Security Solution
- Buyer's Guide to Office 365 & Workspace Email Security
- EnGarde Cloud Email Security: The Logical Solution to Cyber Risk in Office 365
- Exchange Servers Are Vulnerable - Learn How To Secure Your Email Server Now
- Top Email Security Risks in 2021 - How To Set Your Business Up for Safety & Success
- Ransomware By The Numbers: How Big Is My Risk?
- SMB Ransomware Warnings & How To Prevent an Attack
- Apache SpamAssassin 3.4.6 Release Fixes Two Potentially Aggravating Bugs
- Top Tips and Advice for Staying Safe Online in a Work-from-Home World
- Demystifying Phishing Attacks: How to Protect Yourself Now
- Why Your Business Needs Better Email Security
- Why Ransomware is a Threat to Business
- How to Protect Sensitive Data & Maintain Client Trust in Financial Services Industry
- Why Office 365 Users Are Moving Away from Relying on Default Email Protection Alone
- What You Need to Know to Shield Your Business from Ransomware
- Why You Need DMARC to Secure Email against Spoofing Attacks & Sender Fraud
- Biden's Cybersecurity Efforts Highlight the Power of this Key Technology
- Shortcomings of Endpoint Security in Securing Business Email
- Open Source Utilization in Email Security Demystified
- Limitations of Microsoft 365 Email Security & How To Close These Dangerous Gaps
- Think Like A Criminal: What You Need to Know About Social Engineering Attacks in 2021
- Complete Guide to Email Viruses & Best Practices to Avoid Infections
- Security Expert Dave Wreski Discusses Guardian Digital’s Use of Open Source for Email Security
- Are Employees the Weakest Link in Your Email Security Strategy?
- Top Email Security Trends Putting Your Business at Risk of Attack in 2021
- There’s a Lot to be Gained with Effective Email Security
- You’ve Got Mail: How To Tell If It’s Fraud
- How To Keep Email Private with TLS
- DMARC Quarantine vs. Reject: Which Should You Implement to Secure Business Email against Sender Fraud?
- Encryption: An Essential Yet Highly Controversial Component of Digital Security
- Business Email Security Redefined: Key Benefits of Securing Your Business Email with Guardian Digital
- 8 Business Email Security Best Practices
- Demystifying Email Encryption: Stop Sender Fraud
- Demystifying Tax Fraud: How to Avoid Falling Victim to Deceptive, Costly Scams This Tax Season
- Coronavirus Phishing Scams are On the Rise - Is Your Business Email at Risk of Infection?
- Dave Wreski: A Passionate Engineer Brings the Power of Open Source to Business Email Security
- FBI: Existing Cloud Email Protection Inadequate Against Phishing, Ransomware
- Email Risk is Universal: Securing Business Email in Every Industry Sector
- The Remote Worker's Guide to Safely Navigating Office 365
- Why Your Business Needs Superior Email Protection
- Defending Against COVID Email Spoofing Attacks with DMARC
- Open-Source Security Is Opening Eyes
- Think Like A Criminal: How To Write A Phishing Email
- The Four Biggest Email Threats Your Business Faces Today
- Everything On DocuSign Phishing Attacks in 3 Minutes
- Understanding Payload-Less Email Attacks in Under 3 Minutes
- Demystifying Fileless Malware in Less than 3 Minutes
- Apache SpamAssassin Leads A Growing List of Open-Source Projects Taking Steps to Correct Instances of Racism and White Privilege
- Cyber Risk Is Greater than Ever in the Legal Industry
- Understanding Malicious URL Protection - And Why You Need It to Secure Your Email
- Email Security for SMBs Beyond COVID-19
- Email Risk Is BIG for SMBs - How To Protect Your Business Now
- Why Email Security Is More Important Than Ever in This 'New Reality'
- The Threat of CEO Fraud Extends Beyond the C-Suite
- Managed Services: A Key Element of Effective Email Security that Even Modern Solutions Lack
- How to maintain security when employees work remotely: Advice from Leading Security Experts
- FBI: The 2020 Presidential Election Is Under Attack by Email Scammers
- AT&T Security Researchers Identify a Correlation between Strong Cybersecurity and Business Success
- The Aftermath of a Cyberattack Pt. 1: Phishing Recovery Basics
- It Pays to be Prepared! Ransomware Preparedness & Recovery Basics
- Breaking Down Fileless Malware: Anatomy of an Attack
- Keep the Holidays Merry & Bright - Beware of These Sneaky Seasonal Phishing Scams
- Migrating Business Email: The Hidden Complexities You Need To Know
- SPF, DKIM & DMARC: Definition & How They Secure Email Against Sender Fraud?
- Your Current Approach to Email Security May Not Be Enough
- Ways to Prevent Email Account being compromised in a Breach
- Celebrating 20 Years of Revolutionizing Digital Security
- IBM Closes its $34 Billion Acquisition of Red Hat
- Interview with Security Expert and Author Ira Winkler
- What is Phishing Email? How to prevent Phishing email scams?
- Ways Our Business Email Exceed Your Expectations
- Spear Phishing Protection - Definition & How To Recognize Spear Phishing Email
- What is Whaling (Whaling Phishing)? & How to Prevent Whaling attacks?
- Business Email Compromise (BEC) - Definition & Prevention From BEC Attacks
- Wire Transfer Scams Involving Real Estate Transactions: How to Prevent Fraud with Effective Email Security
- Guardian Digital and Mautic: A Dynamic Open-Source Duo
- Email Malware - How to Recognize & Prevent Malware Email Attack
- An Open-Source Success Story: Apache SpamAssassin Celebrates 18 Years of Effectively Combating Spam Email
- What is Spam Email - Types & How to Prevent Spam Emails?
- 2020: A New Decade of Digital Threats - Is Your Business Email Secure?
- Linux: An OS Capable of Effectively Meeting the US Government’s Security Needs Heading into 2020
- Complete Guide on Email Security & Threats Faced by Organizations
- What Are Zero-Day Attacks & How Can I Prevent Them?
- Guardian Digital Keeps its Customers Protected from Intel Design Flaw
- Security Spotlight: Open Source Email Security Solutions
- Top Six Advantages of Open Source Development/Products
- Python and Bash - Contenders for the most used scripting language
- Guardian Digital Outlines Top 4 Benefits of Choosing Cloud
- Unrivaled Protection Against Today’s Most Dangerous Threats
- Guard Your Email Accounts Against Today’s Most Dangerous Threats
- Security Highlights from Defcon 26
- Linux / Open Source FAQs: Common Myths / Misconceptions
- Email Security FAQs Answered by Guardian Digital
- Guardian Digital Mail Systems: Designed to be Secure Without Fail