
Recent reports indicate a surge in cybercriminal activities involving the misuse of DocuSign and police emails to perpetrate fraud. Hackers are exploiting police emails to issue false data requests to technology companies, raising concerns about compliance and data security. Additionally, a joint advisory has identified commonly exploited vulnerabilities, emphasizing the need for improved consumer protection. Threat actors are also utilizing the DocuSign API to send fraudulent invoices, further complicating the landscape of digital security. Experts warn that these tactics are part of a broader trend of using trusted services to bypass security measures, leading to increased instances of credential phishing attacks.





Privacy Tip #421 – Threat Actors Using DocuSign API to Send Fake Invoices https://t.co/brwRkyrByo #Communication #ConsumerProtection #Laws @patentlyo @sheeraf https://t.co/zR2EY0IhmN
In another example of trusted service abuse, attackers attempt to bypass detection of credential phishing by leveraging legitimate Docusign domains and landing pages. Read our new Attack Spotlight for a full breakdown of the attack + variants and how we detected it:… https://t.co/FCXc7SqmSI
docusign going too far? https://t.co/WBYZBV4ubb