Encountering a Cyberthreat: What Should You Do, And Why Is It So Easy to Fall For?

Threats can be hard to spot. When you’re not on the lookout for what might be the entrypoint for a data breach, you’re more likely to miss it. And oftentimes, threat actors are good at reaching you when you’re vulnerable—and when you’re expecting something.

In this post, I’ll paint you a picture using a recent threat we discovered.

A Normal Day:

So you’re working on closing a large contract with a company, and you expect to hear back from them shortly. Suddenly, you get a ping as a new email enters your inbox. You tab over from the latest and greatest trends in dog-based TikToks to see what should be the email you’ve been expecting. You click the link and are brought to a DocuSign page and are prompted to put in your email.

Now let’s pump the breaks. Could something be wrong here?

Recently, our Data Science Team (DSI) encountered a threat that had embedded itself on a reputable site.

The Case:

This particular phish had breached the web infrastructure of this site, and established a falsified web page.

Our DSI team examined some of the history behind this original site, and was able to see for the most part that it looks benign. However there were some flags that led us to a slew of non-unique .ru domains and the redirect in question.

These domains included hot keywords such as “signup”, “signnow”, “counter”, and “maildrop” among others along with randomized domain names.

This is not the normal DocuSign page. This page essentially looks for unsuspecting emails/login information to get access to proper logins.  In addition, it's not typical for a cyrillic redirect to show up in your browser—unless you have that as a default language—and even from there, it’s missing a few components of a typical DocuSign login. A trusted DocuSign login page will have “Powered by DocuSign” in the lower left, an up-to-date Copyright date (this threat was found in 2022, but the date was still 2021), and some of the text in the footer is slightly different.

What Can I Do?

How can you protect yourself? Always verify your links, and always look at who’s sending the email. Sometimes it can be tricky, but when expecting something that has vital information attached, whether it be a bank statement, a document to sign, or something asking for a unique login, it may be worth going to the actual site and entering your information in a fresh browser session. An extra two minutes could save you a world of trouble later. 

We are continuing to keep an eye on this particular case, and are also looking for similar cases. 

If you have a lead, feel free to reach out! We love making your web experience safer. 

Search
  • There are no suggestions because the search field is empty.
Latest posts
Platform, Fires, and You: Navigating the Fine Line Between Operations and Development Platform, Fires, and You: Navigating the Fine Line Between Operations and Development

The Old-School Operations Role: Backbone or Bottleneck?

In the early days of IT, the operations team was the unsung hero—the silent, and often siloed, force that kept everything running. They were responsible for the infrastructure: Servers, databases, and networks that powered the business. They managed deployments, monitored systems, and ensured uptime. If it was working, no one noticed them. If it wasn't? Well, then the questions started: "Wha...

The Hidden Risks of Refreshing Old Threats The Hidden Risks of Refreshing Old Threats

When Vintage Goes Viral (In All the Wrong Ways)

Remember that time you found your old Tamagotchi and thought, "Hey, this could be fun again"? Well, cybercriminals are having a similar nostalgic moment, but instead of resurrecting digital pets, they're breathing new life into outdated malware and long-forgotten data breaches. Welcome to the world of recycled cyber threats, where everything old is terrifyingly new again.

Trends of Cybersquatting, Typosquatting, and Other Malicious Domains Trends of Cybersquatting, Typosquatting, and Other Malicious Domains

The Growing Threat of Malicious Domains in Cybersecurity

As cybercriminals continue to evolve their tactics, domain-based attacks like cybersquatting, typosquatting, and other malicious domains have become a significant threat to businesses and individuals alike. These attacks are designed to exploit trust, impersonate brands, and mislead users into handing over sensitive information—often resulting in financial losses, data breaches, and reputat...

Explore More Content

Ready to brush up on something new? We've got even more for you to discover.