Fake DocuSign email hides tricky phishing attempt
文章描述了一次利用DocuSign通知和Webflow工具进行多层钓鱼攻击的案例。攻击者通过伪造合法链接和Google登录页面欺骗受害者,并收集浏览器数据进行进一步攻击。提醒用户警惕异常链接、启用双重认证并使用安全软件防范此类威胁。 2025-6-27 15:30:54 Author: www.malwarebytes.com(查看原文) 阅读量:12 收藏

On my daily rounds, I encountered a phishing attempt that used a not completely unusual, yet clever delivery method. What began as a seemingly routine DocuSign notification turned into a multi-layered deception involving Webflow, a shady redirect, and a legitimate Google login page.

Webflow is a visual website builder that allows designers and developers to create custom, responsive websites. It’s a no-code solution that allows users to visually design, build, and launch websites directly in the browser

The attack all starts with an email claiming to be from a known contact, referencing a completed DocuSign document.

The email asking the receiver to sign an eDocument
The email asking the receiver to sign an eDocument

The email passed SPF, DKIM, and DMARC, giving it a false sense of legitimacy. The link to “view the completed document” led to a Webflow preview URL. Designers can use these URLs to prototype websites and showcase their work. At this point, it started to look suspicious but not overtly malicious.

However, preview links are not standard for DocuSign and should always raise eyebrows. A legitimate DocuSign request would point to:

  • docusign.com
  • docusign.net
  • docusign.eu (for European users)

But by going through the legitimate Webflow domain the phishers made sure that their first stage was unlikely to get blocked.

Despite me always advising people not to do that, I clicked through (on a Virtual Machine, not my actual computer).

The Webflow preview displayed a mock DocuSign-style interface with a single button: “View Document.”

The webflow preview page
The webflow preview page

Now it was getting hairy. That button linked to a domain that screamed red flag:
s‍jw.ywmzoebuntt.es

The domain looks like a randomized string, a known tactic in phishing infrastructure to evade reputation-based defenses.

Clicking the “View document” button brought me to this fake Captcha which is clearly not designed to stop anyone from proceeding.

click any 4 images
Click any 4 images

Captcha’s are commonly used in phishing schemes to make victims think they’re going through legitimate security verification, but clearly the phishers did not want to overwhelm any potential targets. “Click on any 4 images to prove you’re human” might be the lowest bar ever imagined for a security screening.

After this huge intellectual struggle, I was redirected to Google’s actual login page.

No fake form, no malware download, just Google. That’s what makes this kind of attack easy to miss and even easier to underestimate.

What likely happened is this: the malicious link briefly displayed a cloaked page for fingerprinting. It harvested browser metadata like IP address, user agent, language, screen resolution, and then forwarded me to Google to complete the illusion of safety. My system was likely dismissed based on my system fingerprint, meaning I was not the intended target, so I got sent to a “safe place.”

This is phishing with a twist, a data reconnaissance operation that scopes a target and refines follow-up attacks. The link triggered a cascade of suspicious behaviors: querying BIOS and CPU identifiers, probing browser storage, and modifying user registry entries (all while I was wondering why all Captcha’s are not like that).

If you’ve clicked a link like this:

  • Clear your browser cache and cookies.
  • Check your account login history.
  • Enable 2FA if you haven’t already.
  • Run a full antivirus/malware scan.

Remember: the absence of obvious malware doesn’t mean the attempt failed. It may mean the attackers are just getting started.

This attack looked highly targeted. To avoid falling victim, you should:

  • Not click on links in unsollicited emails. Contact the alleged sender through a separate channel before proceeding.
  • Familiarize yourself with the normal procedure, so uncommon events will be red flags.
  • Use an active antimalware solution with web protection to keep you safe.

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.


文章来源: https://www.malwarebytes.com/blog/news/2025/06/fake-docusign-email-hides-tricky-phishing-attempt
如有侵权请联系:admin#unsafe.sh