Popular digital signature service DocuSign has confirmed a hack of its systems wherein an unnamed third-party gained access to email addresses of its users.
For over a decade, DocuSign has been the go-to ever present digital signature service that digitized tasks which would traditionally see a pen put to paper.
On its website, DocuSign reported a marked rise malicious email campaigns, first revealed on May 9. “The emails “spoofed” the DocuSign brand in an attempt to trick recipients into opening an attached Word document that, when clicked, installs malicious software,” DocuSign wrote on an updated entry on May 15th.
Over the course of the company’s investigation, it soon discovered that a third party gained access to “a separate non-core communication system” used by the company for service-related announcements. This compromised system contained a list of email addresses.
The company further added:
A complete forensic analysis has confirmed that only email addresses were accessed; no names, physical addresses, passwords, social security numbers, credit card data or other information was accessed. No content or any customer documents sent through DocuSign’s eSignature system was accessed; and DocuSign’s core eSignature service, envelopes and customer documents and data remain secure.
At first glance, it appears that the damage caused is minimal, in relative comparison to what might have occurred if the malicious hacker had gained access to additional details. However, consider the millions of users’ email addresses signed up as DocuSign members – the service is estimated to have over 100 million users – and it makes for bad reading. Worse, these emails belong to people who sign documents and do business online. Quite simply, a category of users who cybercriminals target the most for spear-phishing campaigns.
Still, it’s easy to discern the initial phishing campaign which is typically sent from a non-DocuSign domain rife with misspellings.
They appear with the subject line – Completed: [domain name] – Wire transfer for recipient-name Document Ready for Signature” and “Completed [domain name/email address] – Accounting Invoice [Number] Document Ready for Signature”.
For its part, DocuSign claims to have taken ‘immediate action’ to prevent any further unauthorized access to the compromised system and is working with law enforcement agencies.
Image credit: Pexels.
About the author
Florida’s health agency has warned of a data breach that may have exposed the data of up to 30,000...Read more arrow_forward
An Indian news publication has reported that the government’s biggest citizen database, a register...Read more arrow_forward
Security researchers at dark web monitoring firm 4iQ have stumbled upon a massive 41GB data file of...Read more arrow_forward