Popular digital signature service DocuSign has confirmed a hack of its systems wherein an unnamed third-party gained access to email addresses of its users.
For over a decade, DocuSign has been the go-to ever present digital signature service that digitized tasks which would traditionally see a pen put to paper.
On its website, DocuSign reported a marked rise malicious email campaigns, first revealed on May 9. “The emails “spoofed” the DocuSign brand in an attempt to trick recipients into opening an attached Word document that, when clicked, installs malicious software,” DocuSign wrote on an updated entry on May 15th.
Over the course of the company’s investigation, it soon discovered that a third party gained access to “a separate non-core communication system” used by the company for service-related announcements. This compromised system contained a list of email addresses.
The company further added:
A complete forensic analysis has confirmed that only email addresses were accessed; no names, physical addresses, passwords, social security numbers, credit card data or other information was accessed. No content or any customer documents sent through DocuSign’s eSignature system was accessed; and DocuSign’s core eSignature service, envelopes and customer documents and data remain secure.
At first glance, it appears that the damage caused is minimal, in relative comparison to what might have occurred if the malicious hacker had gained access to additional details. However, consider the millions of users’ email addresses signed up as DocuSign members – the service is estimated to have over 100 million users – and it makes for bad reading. Worse, these emails belong to people who sign documents and do business online. Quite simply, a category of users who cybercriminals target the most for spear-phishing campaigns.
Still, it’s easy to discern the initial phishing campaign which is typically sent from a non-DocuSign domain rife with misspellings.
They appear with the subject line – Completed: [domain name] – Wire transfer for recipient-name Document Ready for Signature” and “Completed [domain name/email address] – Accounting Invoice [Number] Document Ready for Signature”.
For its part, DocuSign claims to have taken ‘immediate action’ to prevent any further unauthorized access to the compromised system and is working with law enforcement agencies.
Image credit: Pexels.
About the author
Hackers have broken into a high-profile plastic surgeon in London to steal a cache of sensitive...Read more arrow_forward
Drive-in restaurant chain Sonic is the latest major company to be the target of a significant data...Read more arrow_forward
Major credit reporting firm Equifax has confirmed a data breach that affects a staggering 143...Read more arrow_forward