Alerts and updates
Subscribe using the DocuSign Trust Center Alerts RSS feed URL: https://www.docusign.com/trust/alerts/feed.
Add an RSS reader extension to your browser (Chrome, Firefox), or enable via Outlook on a PC.
-
10/16/2017
DocuSign has observed a new phishing campaign that began the morning of October 16th (Pacific Time).
The email comes from Manuel Robinson (note this name is likely to change) and was sent from the email address dse@longconsult.com. The subject of the email is “Your document Receipt 12345 for <email> is ready for signature!” and it contains a link to a malicious Word document. Do not click the link in this email, instead please forward it to spam@docusign.com and then delete the email immediately. For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB).
-
09/27/2017
DocuSign has observed a new phishing campaign that began the morning of Septemeber 27 (Pacific Time).
The email comes from Michael Evans (note this name is likely to change) and was sent from the email address docusign@dinsinc.com or docusign@signagen.com. The subject of the email is “Your Invoice 12345678 for email@yourdomain.com Document is Ready for Signature” and it contains a link to a malicious, macro-enabled Word document. Do not click the link in this email, instead please forward it to spam@docusign.com and then delete the email immediately. For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB).
-
09/14/2017
DocuSign has observed a new phishing campaign that began the morning of September 14th targeting individuals in the APAC region.
The email comes from "Stephanie Riches via DocuSign” (note, this name is subject to change) using the email address dse_na2@docusigner.org (note the “R”). The email has the subject “Please DocuSign: Shareholder.pdf” and it contains a link to a zip file which in turn contains a malicious javascript file. This email is not sent from DocuSign. Do not click the link in this email, instead please forward it to spam@docusign.com and then delete the email immediately.
For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB).
-
09/06/2017
Apache issued a security alert on September 5, 2017 for Struts, an open source framework for creating Java web applications. The component performs unsafe deserialization and could lead to a remote code execution vulnerability.
DocuSign does not use Apache Struts within our DocuSign services or our Digital Transaction Management platform.
For more information, you can reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9805 or https://struts.apache.org/docs/s2-052.html.
-
09/06/2017
DocuSign has observed a new phishing campaign that began the morning of September 6th (Pacific Time).
The email comes from "Warner Amann via DocuSign” (note, this name is subject to change) using the email address docusign@fmelaw.com. The email has the subject “Your Bill 123456 for yourdomain.com Document is Ready for Signature” and it contains a link to a malicious, macro-enabled Word document. This email is not sent from DocuSign. Do not click the link in this email, instead please forward it to spam@docusign.com and then delete the email immediately.
For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB).
-
08/28/2017
DocuSign has observed a new phishing campaign that began the morning of August 28th (Pacific Time).
The email comes from ""Greg Taylor & Associates, via DocuSign” using the email address dse@kerrs.com with the subject “Your document Settlement 123456 is ready for signature!” and it contains a link to a malicious, macro-enabled Word document. This email is not sent from DocuSign. Do not click the link in this email, instead please forward it to spam@docusign.com and then delete the email immediately.
For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB).
-
08/25/2017
The DocuSign Trust Center is the best source of information regarding alerts or threats to the DocuSign environment.
Always leverage official DocuSign channels to ensure information you receive regarding alerts or threats is accurate. For example, we have been alerted that certain companies are using the DocuSign name (coupled with inaccurate information on security threats) to enhance sales of their security products and services. Stay proactively informed on alerts and threats by subscribing to our DocuSign Support Twitter feed #AskDocuSign or find the latest accurate information by visiting us here at https://docusign.com/trust.
-
08/16/2017
DocuSign has observed a new phishing campaign that began the morning of August 16th (Pacific Time).
The email comes from "Danna & Associates PC” using the email address dse@sessionsusa.com with the subject “Your document Invoice 123456 is ready to be signed!” and it contains a link to a malicious, macro-enabled Word document. This email is not sent from DocuSign. Do not click the link in this email, instead please forward it to spam@docusign.com and then delete the email immediately.
For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB).
-
07/18/2017
DocuSign has observed a new phishing campaign that began the morning of July 18th (Pacific Time).
The email comes from “Carl Evans” using the email address dse@novusimaging.com with the subject “Your document Leasing Contract 123 for <recipient_domain> is ready for signature” and it contains a link to a malicious, macro-enabled Word document. This email is not sent from DocuSign. Do not click the link in this email, instead please forward it to spam@docusign.com and then delete the email immediately.
For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB).
-
06/12/2017
DocuSign has observed a new phishing campaign that began the morning of June 12 (Pacific Time).
The email comes from William Scott “william_scott@flexovitportal.com” with the subject “Please review your document Invoice <1234567> for <recipientdomain.com>” and it contains a link to a malicious, macro-enabled Word document. Do not click the link in this email, instead please forward it to spam@docusign.com and then delete the email immediately. For more information on how to spot phishing please see our Combating Phishing white paper (3.3 MB).
-
05/18/2017If you would like to be automatically informed about the latest security updates and alerts, please follow @askdocusign (DocuSign Support) on Twitter, where we will be posting notifications when the Trust Center is updated.
-
05/17/2017
DocuSign has observed a new phishing campaign that began the morning of May 16 (Pacific Time).
The email comes from “dse@dousign.com” with the subject “Legal acknowledgement for <person> Document is Ready for Signature” and it contains a link to a malicious, macro-enabled Word document. We suggest you do not open this email, but rather delete it immediately.