May 17, 2017 by

DocuSign Data Breach Sees Hackers Steal Millions of Users’ Email Addresses

 Popular digital signature service DocuSign has confirmed a hack of its systems wherein an unnamed third-party gained access to email addresses of its users.

For over a decade, DocuSign has been the go-to ever present digital signature service that digitized tasks which would traditionally see a pen put to paper.

On its website, DocuSign reported a marked rise malicious email campaigns, first revealed on May 9. “The emails “spoofed” the DocuSign brand in an attempt to trick recipients into opening an attached Word document that, when clicked, installs malicious software,” DocuSign wrote on an updated entry on May 15th.

Over the course of the company’s investigation, it soon discovered that a third party gained access to “a separate non-core communication system” used by the company for service-related announcements. This compromised system contained a list of email addresses.

The company further added:

A complete forensic analysis has confirmed that only email addresses were accessed; no names, physical addresses, passwords, social security numbers, credit card data or other information was accessed. No content or any customer documents sent through DocuSign’s eSignature system was accessed; and DocuSign’s core eSignature service, envelopes and customer documents and data remain secure.

At first glance, it appears that the damage caused is minimal, in relative comparison to what might have occurred if the malicious hacker had gained access to additional details. However, consider the millions of users’ email addresses signed up as DocuSign members – the service is estimated to have over 100 million users – and it makes for bad reading. Worse, these emails belong to people who sign documents and do business online. Quite simply, a category of users who cybercriminals target the most for spear-phishing campaigns.

Still, it’s easy to discern the initial phishing campaign which is typically sent from a non-DocuSign domain rife with misspellings.

They appear with the subject line – Completed: [domain name] – Wire transfer for recipient-name Document Ready for Signature” and “Completed [domain name/email address] – Accounting Invoice [Number] Document Ready for Signature”. 

For its part, DocuSign claims to have taken ‘immediate action’ to prevent any further unauthorized access to the compromised system and is working with law enforcement agencies.

Image credit: Pexels.

About the author

Image of Author

LIFARS is a digital forensics and cybersecurity intelligence firm based in New York City. LIFARS is ranked as one of the top Digital Forensics and Cyber Investigations companies in 2016 and as one of the top cybersecurity companies in the New York metropolitan area for 2015 on the Cybersecurity 500 – a directory of the hottest and most innovative companies to watch in the cybersecurity industry.

Related articles

Data Breach Hits over 1,000 Intercontinental Hotels

The Intercontinental Hotel Group, the operator of hotel chains like the Holiday Inn and the...

Read more arrow_forward

Report: The SEC is Probing Yahoo Over Data Breaches

Authorities are investigating whether Yahoo should have reported its two significant data breaches...

Read more arrow_forward

Yahoo! Admits to Hack of a Billion(+) User Accounts

Yahoo! Inc, one of the biggest Internet companies during its heyday, has now revealed that a hack...

Read more arrow_forward

If you have any further questions, please don't hesitate to contact us.