chat
expand_more

The PandaDoc Bait-and-Switch Scam

Empty Docs, Real Threats: Using PandaDoc & Dropbox to Bypass SEGs

NEW Piotr Thumbnail 1x1 Feb 25

What is the attack?

  • Phishing Email: Victims receive an email stating that a document has been shared via PandaDoc.

  • Decoy Document: When opened, the PandaDoc link leads to a blank or non-functional document, acting as a decoy.

  • Social Engineering Trick: The email instructs victims that if the document does not render properly, they should copy and paste a provided Dropbox link instead.

Why did it get through?

  • Verified Source: Email sent from a domain passing sender authentication checks.

  • Legitimate Hosting: The document was hosted on legitimate PandaDoc and Dropbox site, lending it an air of legitimacy.

  • URL Crawling/Analysis Protection: The added Captcha functionality limits automated link crawling and URL analysis features, increasing the difficulty for automated detection.

What is required to solve for this attack?

  • Behavioral Analysis: Abnormal’s Behavioral AI flags never-before-seen senders, unusual email content, and URLs as anomalies that enable the detection of novel attacks.

  • Defense-in-depth: This pairs well for defense in depth with the Cloud Email Platform (M365’s) Threat Intelligence layer.