6 November 2024

Threat actors abuse DocuSign’s Envelopes API to mass-distribute fake invoices


Threat actors abuse DocuSign’s Envelopes API to mass-distribute fake invoices

Malicious actors have begun misusing DocuSign’s Envelopes API to distribute fraudulent invoices that mimic well-known brands, including Norton and PayPal. By leveraging a legitimate platform attackers bypass traditional email security defenses, making their emails appear trustworthy and credible to recipients.

The fraudulent invoices are sent directly through the DocuSign electronic signature service. Phishing emails often include legitimate-looking documents that prompt recipients to sign off on payments, independently of their company’s finance department.

Attackers create and pay for legitimate DocuSign accounts, giving them access to the platform’s full suite of tools, including template customization and API access. They then craft templates that replicate legitimate e-signature requests from recognizable brands, often including details such as accurate pricing for specific products and additional charges (a $50 activation fee).

The invoices typically request an e-signature, which, once provided, gives attackers the authorization to demand payment directly from a company’s finance team or an organization’s banking department. Some invoices even include direct wire instructions or purchase orders, which, if executed, transfer funds directly to the attacker’s bank accounts.

“Because the invoices are sent directly through DocuSign's platform, they look legitimate to the email services and spam/phishing filters. There are no malicious links or attachments; the danger lies in the authenticity of the request itself,” Wallarm researchers wrote in their report.

According to Wallarm, the number of such malicious campaigns have surged over last five months, so its strongly advised that organizations take steps to avoid falling victim to such attacks. The measures include verifying sender credentials, requiring internal approvals, conducting awareness training, and monitoring for anomalies.

Back to the list

Latest Posts

Threat actors abuse DocuSign’s Envelopes API to mass-distribute fake invoices

Threat actors abuse DocuSign’s Envelopes API to mass-distribute fake invoices

By leveraging a legitimate platform attackers bypass traditional email security defenses.
6 November 2024
VEILDrive threat actors exploit Microsoft services in novel C2 campaign

VEILDrive threat actors exploit Microsoft services in novel C2 campaign

The campaign, suspected to be of Russian origin, has been active since early August 2024 and remains ongoing.
6 November 2024
Hackers disable tracking for UK prison vans and courier fleets

Hackers disable tracking for UK prison vans and courier fleets

The breach has affected tracking software provided to outsourcing company Serco used to monitor prisoner movements.
6 November 2024