Platform
By Use Case
Stop Phishing
Block dangerous links instantly
Protect Sensitive Data
Prevent sensitive data leaks
Govern LLM Usage
Discover and monitor AI apps
Filter Web Content
Control web access in real-time
By Team Size
New to Security
For simple starts to the essentials
Small IT Team
For the overworked IT team of one
Small Security Team
For growing teams and priorities
Enterprise Security
For complex security requirements
By Features
Data Loss Prevention
Content Filtering
Session ProtectionAI Phishing PreventionAudit LogsException RequestsRequest a Feature
Sign up for the waitlist
Take your security to the next level. Your team deserves it.
Sign Up
Resources
COMPANY
About Us
Learn more about the Repacket team
Contact Us
Quick contact form
Schedule a Demo
Get a guided walkthrough of Repacket!
Learn More
Repacket Blog
Catch up on news and updates!
Documentation
Detailed docs for security teams
AI Acceptable Use Templates
Get our policy templates for your org!
Security Engineering Show
Check out our podcast!
EnterpriseDocsPricing
Get Early Access
Get Started (Free!)
Blog
Insights

DocuSign Phishing Advisory (2024-2025)

By
Repacket Staff
February 7, 2025
•
5 min read

DocuSign Security Alert: Attackers Using Legitimate Accounts for Sophisticated Phishing (2024-2025)

We're seeing a concerning trend: scammers are now bypassing security by purchasing legitimate DocuSign accounts rather than spoofing them. Here's what you need to know:

The New Attack

Threat actors send phishing emails directly through DocuSign's infrastructure (@docusign.net domains), making them harder to detect and filter. They often embed QR codes or links in documents leading to credential harvesting sites.

Common Themes

- PayPal security alerts about crypto transactions
- HR documents (benefits, compensation updates)
- Purchase orders and invoices
- Windows/Microsoft 365 security updates

How to Spot These Attacks

The most reliable indicator is expectation - if you weren't anticipating a document, be suspicious. Look for:
- Emails containing only images
- Missing DocuSign security codes
- Generic greetings and content
- Outdated DocuSign branding (pre-April 2024)
- Urgent payment/security notifications

If You Click

Time is critical. Immediately:
1. Contact your bank if you shared payment details
2. Run antimalware scans if you downloaded anything
3. Change compromised passwords
4. Report to spam@docusign.com and the FTC
5. Document the incident

Protection Strategy

The safest approach is accessing DocuSign directly:
1. Never click email links for unexpected documents
2. Go to docusign.com and use document codes
3. Verify with senders through other channels
4. Report suspicious emails to IT security

Remember: legitimate DocuSign use is growing, but so are these sophisticated attacks. When in doubt, verify through separate channels - a quick call or message could save you from a costly breach.

Table of contents

Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Share this post
Insights
5 min read

The Security Paradox: Why Large Organizations Struggle Despite Abundant Resources

Large organizations face a security paradox: substantial resources but persistent vulnerabilities. This analysis examines seven critical pain points—from organizational silos and technical debt to identity sprawl and alert overload—revealing how organizational complexity, not resource constraints, undermines security effectiveness despite dedicated teams and million-dollar budgets.
Read more
Insights
5 min read

Small Business Security: Fighting Very Real Threats with Very Limited Resources

Small organizations face a dangerous mismatch: combating sophisticated cyber threats with minimal resources. This analysis examines six critical security pain points—from single points of failure and default configurations to shadow IT and failed recovery capabilities—that put small businesses at risk despite their IT teams' best efforts.
Read more
Insights
5 min read

The Uncomfortable Middle: Security Challenges Faced by Mid-Size Organizations

Mid-size organizations face unique security challenges: caught between enterprise-level threats and limited resources. This analysis examines seven critical pain points—from staffing constraints and tool proliferation to compliance burdens and cloud security gaps—that create persistent vulnerabilities despite security teams' best efforts.
Read more
Repacket // Get Started

Set up your customized Repacket instance

Schedule time with our team and speak with our founders about how Repacket can fit your organization's specific needs!

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Find Us Online
Contact:
support@repacket.com
‍
Repacket Canada
1285 W Broadway #600
Vancouver, BC V6H 3X8, Canada
‍
Repacket USA
2261 Market Street #5084
San Francisco, CA 94114
Stop PhishingProtect Sensitive DataGovern LLM UsageFilter Web ContentRepacket Documentation
For New Security NeedsFor Small IT TeamsFor Security TeamsFor Enterprise SecurityAI Acceptable Usage Policy
About RepacketContact UsSchedule a DemoGet Early AccessRepacket Blog
© 2025 Repacket. All rights reserved.
Privacy PolicyTerms of Service