Feb. 1, 2023, 3:05 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news


Scammers used a malicious DocuSign document in a campaign that tried to steal credentials belonging to more than 10,000 people across several organizations. 


Researchers at cybersecurity company Armorblox said the brand impersonation campaign targeted Microsoft Office 365 email accounts and managed to bypass other security tools. 



A sample of the scam emails

The subject of the emails was “Please DocuSign: Approve Document 2023-01-11” in an attempt to make victims think the email was urgent and needed to be opened as …

accounts armorblox brand brand impersonation bypass campaign credentials cybersecurity cybersecurity company document docusign email emails impersonation malicious managed microsoft microsoft office microsoft office 365 office office 365 organizations people report researchers scam scammers security security tools steal tools

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer 2

@ Oracle | BENGALURU, KARNATAKA, India

Oracle EBS DevSecOps Developer

@ Accenture Federal Services | Arlington, VA

Information Security GRC Specialist - Risk Program Lead

@ Western Digital | Irvine, CA, United States

Senior Cyber Operations Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

AI Cybersecurity Architect

@ FactSet | India, Hyderabad, DVS, SEZ-1 – Orion B4; FL 7,8,9,11 (Hyderabad - Divyasree 3)