Alerts and updates
DocuSign is tracking a malicious email campaign where the subject reads: "Completed: docusign.com - Wire Transfer Instructions for recipient-name Document Ready for Signature”.
The email contains a link to a downloadable Word Document which is designed to trick the recipient into running what’s known as macro-enabled-malware.
These emails are not associated with DocuSign. They originate from a malicious third-party using DocuSign branding in the headers and body of the email. The emails are sent from non-DocuSign-related domains including [email protected] (note the missing "I"). Legitimate DocuSign signing emails come from @docusign.com or @docusign.net email addresses.
Please remember to be particularly cautious if you receive an invitation to sign or view a Document you are not expecting. If you have received a copy of the above email, DO NOT OPEN ANY ATTACHMENTS. Instead, forward the email to [email protected] and then immediately delete the email from your system.
For further advice on how to recognize malicious emails and how to protect yourself you can visit our Trust Center here: https://trust.docusign.com/en-us/personal-safeguards/fraudulent-email-we...
As a leader in online eSignature security and compliance, DocuSign has a zero-tolerance policy for this type of malicious email and is fully prepared to ensure minimal impact to our customers and company. As we’ve seen, this type of malicious activity is becoming more common, especially to organizations with established, trusted brands. Please note that this malicious activity has no relation to any activity DocuSign is involved.
Recently there was an issue reported by Cloudflare that impacted their edge servers.
The issue in some cases involved surpassing the end of a buffer and returning memory that contained private information such as HTTP cookies, authentication tokens, HTTP POST bodies, and other sensitive information. Portions of this data may have been cached by search engines and therefore it’s recommended to change your passwords to any services hosted by Cloudflare.
DocuSign does not utilize Cloudflare in our Digital Transaction Management platform nor do we leverage this service for our corporate infrastructure.
For more information, please see the link below: https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/