False DocuSign Notification: Credentials Sent to Telegram Bot

Summary:

A recent phishing campaign targeting DocuSign has been identified by CERT-AGID. The fraudulent emails contain HTML attachments designed to steal user credentials, allowing attackers to access sensitive accounts and information. The phishing page mimics the DocuSign login interface and sends captured credentials to a Telegram bot.

Keypoints:

  • Phishing campaign specifically targeting DocuSign users.
  • Fraudulent emails include HTML attachments that replicate the DocuSign login page.
  • Stolen credentials are sent to a Telegram bot for malicious use.
  • Criminals can access sensitive documents and personal information, leading to potential fraud.
  • Recommendations include vigilance against phishing threats and awareness of suspicious communications.
  • MITRE Techniques

  • Phishing (T1566): Utilizes deceptive emails to trick users into providing sensitive information.
  • Credential Dumping (T1003): Collects user credentials to gain unauthorized access to accounts.
  • Command and Control (T1071): Uses a Telegram bot to receive stolen credentials from compromised users.

  • 12/11/2024

    Phishing DocuSign

    CERT-AGID recently detected a phishing campaign themed around DocuSign, a well-known platform for electronic signatures and document management. These deceptive emails contain HTML attachments designed to steal user credentials, allowing attackers to access sensitive accounts and information.

    DocuSign Phishing Page

    Once the HTML attachment is opened, the browser displays a page containing a login form that mimics the DocuSign interface. The goal, as inferred from the JavaScript code included in the HTML file, is to send the victim’s credentials to a Telegram bot.

    JavaScript Code Designed to Send Credentials to the Telegram Bot

    Why is DocuSign an Attractive Target for Cybercriminals?

    Criminals can access confidential documents, contracts, and personal information, using this data to commit fraud or create fake contracts. Additionally, the credentials can be sold on the dark web, where other malicious actors can exploit them for illegal purposes, further increasing the risk to victims.

    Countermeasures

    CERT-AGID has communicated, through the IoC Feed, the only useful indicator: the URL of the Telegram bot. The hashes of the HTML file vary from time to time, as they are customized with the recipient’s email address.

    Recommendations

    It’s important to remain vigilant and informed about phishing threats to protect your data. Paying attention to suspicious communications and taking simple precautions can make a difference in safeguarding personal and professional information.

    Source: Original Post