This content is viewable by Everyone

Dec 2025: BONUS-RELATED DOCUSIGN LURES

Bonus Lure Inidcators

Threat Alert: BONUS-RELATED DOCUSIGN LURES

  • Threat actors impersonate DocuSign in a credential phishing campaign with the intention of collecting user credentials and payment information.
  • The campaign used HR bonus-related lures to create urgency and trick users into opening malicious links.
  • This tactic has been used multiple times in the past, commonly occurring toward the end of the year—coinciding with legitimate HR documentation.
  • End users are directed through a chain of redirects, ultimately leading to a PDF-themed credential harvesting page.

How is it used in the wild?

  • Messages are sent appearing to be from DocuSign (qbo@docusign[.]com) with the subject “HR Announcement: Let’s Wrap Up the Year Right – Complete Your Bonus Form.”
  • The initial link is from docsend[.]com, a legitimate document sharing platform owned by DropBox that was abused by the threat actor. After redirecting through multiple landing pages, the end user is directed to a PDF-themed credential harvesting page.
  • Threat actors collect both user credentials and payment information through this campaign.

Key Action: Stay Alert!

  • Be extremely cautious of any urgent HR or bonus-related messages, especially those requiring immediate action.
  • Know where legitimate UCSF HR-related communications will come from, so you have a baseline to compare potentially anomalous traffic to.
  • Make a practice of scrutinizing message headers for spoofed senders. And be wary of messages that elicit an emotional response, such as notifications around pay.
  • Remain alert to phishing indicators. Mismatches between sending addresses and an organization’s name are always warning signs.
  • Report ANY suspicious emails via Phish Alarm.