Every now and again we see a phishing scam that stops you in your tracks and you think WTF. this is one of them.
It starts with a fake Docusign email that contains a link to a bit.ly short url.
What makes this one so bad is that the bit.ly short url has been live since 20 August 2019 and as of the time of writing has had 1801 clicks.
Now to make it even worse the bit.ly redirect is to a lawyers office http://stevensandgoldwyn.com that probably has been compromised for the same length of time or even longer. I have absolutely no idea what client or confidential info might also have been compromised, but in general if the criminals managed to get the phishing scam onto the website there is frequently a webshell somewhere on it that will allow complete control of both webspace & email. To compound the problem this website is running on HTTP not HTTPS because the digital Certificate expired almost 18 months ago.
You can now submit suspicious sites, emails and files via our Submissions system
Remember many email clients, especially on a mobile phone or tablet, only show the Name in the From: and not the bit in <domain.com >. That is why these scams and phishes work so well.
The email looks like:
From: DocuSign via DocuSign <email@example.com>
Date: Wed 25/09/2019 05:25
Subject: Please DocuSign: Closing diclosure & Commission instructions
Your document has been completed.
VIEW COMPLETED DOCUMENT <https://bit.ly/2P6T5rM?m=bc5d6def-a143-459d-abf5-4d97865b32f2>
Do Not Share This Email
This email contains a secure link to DocuSign. Please do not share this email, link, or access code with others.
Sign documents electronically in just minutes. It’s safe, secure, and legally binding. Whether you’re in an office, at home, on-the-go — or even across the globe — DocuSign provides a professional trusted solution for Digital Transaction Managementâ„¢
After clicking one of the links on the fake PDF shown above you go to one of these pages
Now zapto.org is another free dynamic DNS service which redirects the visitor to an unknown location. I cannot determine what location this redirects to.
We all get very blasé about phishing and think we know so much that we will never fall for a phishing attempt. Don’t assume that all attempts are obvious. Watch for any site that invites you to enter ANY personal or financial information. It might be an email that says “you have won a prize” or “sign up to this website for discounts, prizes and special offers”
Please read our How to protect yourselves page for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying “look at this picture of me I took last night” and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details. Be very careful when unzipping them and make sure you have “show known file extensions enabled“, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.