chat
expand_more

When SEGs Fail: Threat Actors Abuse Docusign to Launch Sophisticated Phishing Attacks

Threat actors are exploiting Docusign to bypass traditional email security, but Abnormal Security’s AI-powered platform stops these attacks by detecting behavioral anomalies in real time.
February 6, 2025

At Abnormal Security, we’ve seen a surge in phishing campaigns exploiting Docusign, a trusted platform for electronic signatures. These attacks take advantage of Docusign’s credibility to bypass traditional email defenses, tricking recipients into sharing sensitive information or transferring money.

Despite Docusign issuing a Public Service Announcement (PSA) in late 2024 to warn users, attackers continue refining their techniques—leveraging trusted brands to carry out sophisticated phishing campaigns.

How These Attacks Work

Phishing emails mimicking Docusign notifications exploit brand trust to deceive recipients. Abnormal Security has identified a few recurring tactics used in these attacks.

Docusign1

As you can see from the example above, these tactics include:

  • Low-Context File Sharing Links: Emails often contain Docusign links with vague or no explanation of the document’s purpose.

  • Unusual Senders: Attackers impersonate Docusign using email addresses with no prior interaction with recipients.

  • Suspicious Financial Requests: Many emails request payment adjustments or fund transfers, actions uncommon for the recipient’s role.

  • Reply-To Mismatch: Reply-To domains rarely match Docusign or the sender’s domain.

  • Credential Theft: The email content is often designed to steal sensitive information like login credentials or payment details.

Why Traditional Email Security Fails

Legacy email security solutions, like secure email gateways (SEGs), are not equipped to detect sophisticated phishing attacks that exploit trusted platforms like Docusign. Here’s why:

  • Static Rules and Whitelists: SEGs rely on static rules, keyword matching, and allowlists to filter emails. While this works for broad, easily identifiable attacks, it is ineffective against sophisticated threats that use trusted domains like Docusign to bypass defenses.
  • Lack of Behavioral Analysis: SEGs do not analyze user or organizational behavior to identify anomalies. For instance, they cannot detect when an email is inconsistent with the recipient’s typical interactions or role-specific responsibilities.
  • Insufficient Contextual Awareness: Traditional systems focus on email headers and authentication protocols (e.g., SPF, DKIM, and DMARC). These methods verify the domain but cannot flag misuse of legitimate accounts or platforms.

By relying on outdated approaches, SEGs create a false sense of security, leaving organizations vulnerable to advanced phishing campaigns.

How Abnormal Detects Sophisticated Phishing Attacks

Abnormal’s AI-native platform continuously learns your organization’s unique behavior patterns to detect even the most sophisticated threats. Here’s how we stopped an attack abusing Docusign:

  • Behavioral Anomaly: The sender had no prior interaction with the recipient, a red flag detected by Abnormal’s models.

  • Low-Context Link: The Docusign link was flagged as suspicious, correlating with patterns used in previous phishing campaigns.

  • Unusual Request: The email urged a payment adjustment—an action uncommon for the recipient’s role.

  • Reply-To Mismatch: The Reply-To domain differed from both Docusign and the sender’s domain, further raising suspicion.

Abnormal identified this email as malicious in real-time, removing it from the user’s inbox before it could cause harm. This underscores Abnormal’s ability to detect and neutralize threats—even those leveraging trusted platforms.

Stay Ahead of Evolving Threats with AI-Powered Email Security

As attackers grow more sophisticated, exploiting trusted platforms like Docusign, traditional email security solutions fall behind. Protecting your organization requires a proactive, AI-powered approach capable of understanding user behavior and intent.

Discover how Abnormal Security safeguards your organization from advanced phishing attacks. Schedule a demo today!

Schedule a Demo
When SEGs Fail: Threat Actors Abuse Docusign to Launch Sophisticated Phishing Attacks

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B Convergence
Explore key takeaways from Season 4 of Convergence, covering how malicious AI is reshaping cybercrime, why human behavior remains a core vulnerability, and what evolving AI policy means for defenders.
Read More
B Social Engineering
Today’s targeted cyber attacks are so formidable that legacy defences can’t stop them, and even savvy professionals are being fooled. These examples show how sophisticated they’ve become.
Read More
Blog Cover 1500x1500 Template v3 0 DO NOT EDIT OR DELETE
Email bombing turns trusted sources into a smokescreen, flooding inboxes to distract users and hide follow-up threats.
Read More
B Evil Panel Blog
EvilPanel is a new phishing toolkit built on Evilginx that provides a full-featured web interface for launching MFA-bypassing attacks.
Read More
B SAT
Discover why traditional security awareness training isn’t reducing human risk and how AI-driven, personalized training can transform SAT effectiveness in 2025.
Read More
B 1500x1500 Through the Looking Glass RSAC 2026
What did RSAC 2025 reveal about the next wave of cyberthreats—and the AI-powered tools to stop them? Abnormal’s Field CISO shares her top takeaways.
Read More