1. Hackers Abuse DocuSign APIs to Target Large Businesses With Fake ...

    https://www.cpomagazine.com/cyber-security/hackers-abuse-docusign-apis-to-target-large-businesses-with-fake-invoices/

    Attackers are targeting the service’s Envelopes API to generate large amounts of fake invoices, which often skirt automated security and land in inboxes as they originate from “docusign.net” and appear to be coming from legitimate companies. But the attack adds a new layer as it allows the hackers to obtain a company e-signature and put ...

  2. Docusign Scam Emails Explained & Red Flags - Trend Micro News

    https://news.trendmicro.com/2024/11/05/docusign-scam-emails-phishing/

    November 5, 2024. iStock. In the world of online scams, phishing emails remain a prevalent threat, where scammers mimic trustworthy entities to steal your personal and financial data or login credentials. Docusign, a reputable leader in electronic signature technology, has unfortunately become a common disguise for such scams.

  3. DocuSign Exploit Lets Hackers Send Fake Invoices - Forbes

    https://www.forbes.com/sites/larsdaniel/2024/11/05/docusign-exploit-lets-hackers-send-fake-invoices/

    DocuSign, Inc. is an American company providing document management services. getty. In a recent cyber threat development discovered by the Wallarm security firm, attackers are exploiting DocuSign ...

  4. Beware the FAKE PayPal DocuSign Email Scam Stealing Money

    https://malwaretips.com/blogs/paypal-docusign-email-scam/

    It will provide a DocuSign link to supposedly reverse the charge and urge you to call a customer support number. Red flags include grammatical errors, a suspicious sender address, and an unusual support number. 2. What is the goal of the PayPal DocuSign scam? The scam aims to steal your personal and financial information.

  5. Malicious actors are exploiting DocuSign to send fake invoices

    https://www.securitymagazine.com/articles/101179-malicious-actors-are-exploiting-docusign-to-send-fake-invoices

    November 8, 2024. A new report reveals that malicious actors are exploiting APIs in DocuSign to send fake invoices. These invoices appear authentic and leverage legitimate DocuSign accounts to impersonate reputable companies, making this campaign stand apart from other phishing attempts. This method can deceive both users and traditional ...

  6. Attackers Abuse DocuSign to Send Phony Invoices

    https://blog.knowbe4.com/attackers-abuse-docusign-to-send-phony-invoices

    7 Nov. Threat actors are abusing DocuSign’s API to send phony invoices that appear “strikingly authentic,” according to researchers at Wallarm. “Unlike traditional phishing scams that rely on deceptively crafted emails and malicious links, these incidents use genuine DocuSign accounts and templates to impersonate reputable companies ...

  7. Scammers use DocuSign API to send fraudulent invoices

    https://eftsure.com/blog/cyber-crime/scammers-use-docusign-api-to-send-fraudulent-invoices/

    CFOs, beware: cybercriminals are exploiting DocuSign’s legitimate business tools to deliver fraudulent invoices directly through trusted channels. This scheme is particularly dangerous for finance teams because it operates within standard business workflows, using DocuSign APIs, accounts and templates. The resulting fake payment requests can ...

  8. Docusign API Abused in Widescale, Novel Invoice Attack

    https://www.darkreading.com/cloud-security/docusign-api-abused-invoice-attack

    Fake invoices are often a part of financially motivated phishing scams, and Docusign — which offers enormously popular software for digital signatures with more than 1.5 million paying customers ...

  9. Docusign-themed phishing emails | Kaspersky official blog

    https://www.kaspersky.com/blog/docusign-phishing-emails/52420/

    Phishers have adopted another trick: they send emails pretending to be from Docusign with a fake link to a document that the recipient must sign. Roman Dedenok. October 14, 2024. Phishers are forever devising new tricks and finding new services to exploit and impersonate in their phishing campaigns. Today we talk about phishing emails that ...