DocuSign Spoof Emails – detect and prevent secure document phishing attacks

DocuSign have admitted they were the victim of a data breach that has led to massive phishing attacks using the compromised DocuSign user data. Secure document phishing attacks are some of the latest in client endpoint exploits that to the unsuspecting user can have serious repercussions. This latest hack resulted in a 3rd party gaining unauthorised access to a list of email addresses stored on an unsecured DocuSign platform – other than this no private user account data was accessed, however this has resulted in a significant volume of ‘spoof’ DocuSign emails being sent to these users in an attempt to trick recipients into opening an attached Word or PDF document that, when clicked, installs malicious software.

The attackers hit a “non-core system that allows us to communicate service-related announcements to users via email”, the company said in a blog post on the incident.

DocuSign have released the following helpful guidance:

What should I do if I receive a suspicious email?

First and foremost, if you don’t recognise the sender of a DocuSign envelope and you are uncertain of the authenticity of an email, look for the unique security code at the bottom of the notification email. All DocuSign envelopes include a unique security code.

If you think that you have received a fraudulent email, please forward the email to, then delete the email.

Please check out the DocuSign Trust Center for the most up-to-date information about personal security and review our whitepaper on phishing.

If there is a security code…

  • Access your documents directly from, click Access Documents then enter the unique security code.

If there is NO security code…

  • DO NOT click on links or open attachments within the email. This is not a valid DocuSign email and it should be sent to our security team immediately at

IMPORTANT: If you did click on a link and provided your DocuSign credentials, please be sure to change your password immediately to ensure the security of your account.

Please update and run antivirus immediately to ensure the security of your system or contact your IT support provider for immediate assistance.

When the chips are down…. Intel processor security flaws – what you need to know!

F**CKWIT, aka KAISER, aka KPTI, Meltdown & Spectre – Intel CPU flaw needs low-level OS patches.

A fundamental design flaw in Intel’s processor chips has forced a significant redesign of the Linux and Windows kernels to resolve the chip-level security bug. Similar operating systems, such as Apple’s 64-bit macOS, will also need to be updated – the flaw is in the Intel hardware and the only was to fix it is at the Operating System level – or worst case to be totally sure you can go buy a new processor without the design fault.

Microsoft have already released an update which will automatically be applied to Windows 10 machines. For users running any other Operating System we recommend you manually check and apply any pending system updates to ensure you are protected. Antivirus providers are also reacting by releasing software updates to combat any potential risks from the newly discovered flaw.

If you run Sophos (our recommended security software) then you are already protected as updates were released on January 5th. You can read more here –