The DocuSign phishing attack is the latest malicious tactic used to coerce computer users into entering their account credentials on a fake login page. Such actions can have very dangerous consequences and as a result can infect the system with various malware. Our guide shows how potenital targets can spot the scam and evade it.


Threat Summary
Name | DocuSign Phishing Scam |
Type | Scam / Malware |
Short Description | This scam uses harvested or stolen information about the users by posign as a legitimate service. |
Symptoms | Displayed scam login pages. |
Distribution Method | Via e-mail messages, redirects and browser hijackers . |
Detection Tool | See If Your System Has Been Affected by DocuSign Phishing Scam Download Malware Removal Tool | User Experience | Join Our Forum to Discuss DocuSign Phishing Scam. |


DocuSign Phishing Scam – Overview
The security community has alerted of a new threat — the DocuSign Phishing Scam. The hackers behind it have created a counterfeit site that poses as a legitimate login page for DocuSign, one of the leading electronic signature companies.
The practice makes use of two common tactics associated with these type of threats:
- Domain Name — The hackers use a similar sounding domain name — dacusign.^net VS docusign.com.
- Web Elements — The criminals have hijacked legitimate web elements that are used by the service.
Users can receive the DocuSign phishing scam through email messages. They are sent using a bulk distribution campaign and may either display the message itself or contain a long text-based body contents that redirect to the constructed site. In most cases the messages will be sent via the spoofed domain. Another tactic would be to spoof other users and send the messages through them.
Still the most popular method still remains the site itself. Users can get redirected to it via malicious redirects and scripts. They come under various forms, most commonly disguised as pop-ups, banners, redirects, in-line hyperlinks and etc. In many cases they can also make use of affiliate networks and users can access them via banners that can be found even on legitimate sites.
The criminals can also employ browser hijackers — they represent malicious web browser extensions that are usually spread on the plugin repositories and are advertised as useful additions. Most of them rely on fake developer credentials, false user reviews and elaborate descriptions. Once they are installed a common tactic is to reconfigure the browsers into redirecting to a hacker-controlled page.
The reason why the DocuSign phishing scam is being performed against computer users is that the hackers can easily steal information. The have prepared a fake DocusSign login page that requests their credentials (email address and password) that if entered allow the criminal controllers to attempt and use them for additional services. The dangerous fact about the scam is that it allows the users to use other services to login:
- Microsoft
- Yahoo
While the scam seems to primarily attempt to harvest user data it can have some very dangerous consequences. Apart from the hackers having access to a primary account credential. This information can then be used by the hackers to attempt and intrude into other accounts owned by the users.
A dangerous practice is the continued display of instructions to the victims. The hacker can lure them into downloading viruses of all kinds: Trojans, ransomware, worms and etc. A dangerous tactic is when the site loads scripts or plugins to the affected browsers. A possible case scenario is the introduction of cryptocurrency miners to the victim hosts — they use the available system resources in order to carry out complex mathematical calculations. The results are reported to a server and as a reward money is transferred to the criminal operators in the form of digital currency assets.


Martin Beltov
Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.


Martin Beltov
Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.


Martin Beltov
Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.
Preparation before removing DocuSign Phishing Scam.
Before starting the actual removal process, we recommend that you do the following preparation steps.
- Make sure you have these instructions always open and in front of your eyes.
- Do a backup of all of your files, even if they could be damaged. You should back up your data with a cloud backup solution and insure your files against any type of loss, even from the most severe threats.
- Be patient as this could take a while.
Step 1: Boot Your PC In Safe Mode to isolate and remove DocuSign Phishing Scam










Step 2: Clean any registries, created by DocuSign Phishing Scam on your computer.
The usually targeted registries of Windows machines are the following:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
You can access them by opening the Windows registry editor and deleting any values, created by DocuSign Phishing Scam there. This can happen by following the steps underneath:






Step 3: Find files created by DocuSign Phishing Scam




For Newer Windows Operating Systems
1: On your keyboard press + R and write explorer.exe in the Run text box and then click on the Ok button.
2: Click on your PC from the quick access bar. This is usually an icon with a monitor and its name is either “My Computer”, “My PC” or “This PC” or whatever you have named it.
3: Navigate to the search box in the top-right of your PC’s screen and type “fileextension:” and after which type the file extension. If you are looking for malicious executables, an example may be “fileextension:exe”. After doing that, leave a space and type the file name you believe the malware has created. Here is how it may appear if your file has been found:
N.B. We recommend to wait for the green loading bar in the navination box to fill up in case the PC is looking for the file and hasn’t found it yet.
For Older Windows Operating Systems
In older Windows OS’s the conventional approach should be the effective one:
1: Click on the Start Menu icon (usually on your bottom-left) and then choose the Search preference.
2: After the search window appears, choose More Advanced Options from the search assistant box. Another way is by clicking on All Files and Folders.
3: After that type the name of the file you are looking for and click on the Search button. This might take some time after which results will appear. If you have found the malicious file, you may copy or open its location by right-clicking on it.
Now you should be able to discover any file on Windows as long as it is on your hard drive and is not concealed via special software.
Before starting “Step 4”, please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.
Step 4: Scan for DocuSign Phishing Scam with SpyHunter Anti-Malware Tool
Step 5 (Optional): Try to Restore Files Encrypted by DocuSign Phishing Scam.
Ransomware infections and DocuSign Phishing Scam aim to encrypt your files using an encryption algorithm which may be very difficult to decrypt. This is why we have suggested a data recovery method that may help you go around direct decryption and try to restore your files. Bear in mind that this method may not be 100% effective but may also help you a little or a lot in different situations.
For more “how-to” file recovery methods and steps, you can visit our instructive article on “How to Restore Files Encrypted by Ransomware (Without Decrypter)“.


Martin Beltov
Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.
Preparation before removing DocuSign Phishing Scam.
Before starting the actual removal process, we recommend that you do the following preparation steps.
- Make sure you have these instructions always open and in front of your eyes.
- Do a backup of all of your files, even if they could be damaged. You should back up your data with a cloud backup solution and insure your files against any type of loss, even from the most severe threats.
- Be patient as this could take a while.
Step 1: Boot Your PC In Safe Mode to isolate and remove DocuSign Phishing Scam










Step 2: Clean any registries, created by DocuSign Phishing Scam on your computer.
The usually targeted registries of Windows machines are the following:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
You can access them by opening the Windows registry editor and deleting any values, created by DocuSign Phishing Scam there. This can happen by following the steps underneath:






Step 3: Find files created by DocuSign Phishing Scam




For Newer Windows Operating Systems
1: On your keyboard press + R and write explorer.exe in the Run text box and then click on the Ok button.
2: Click on your PC from the quick access bar. This is usually an icon with a monitor and its name is either “My Computer”, “My PC” or “This PC” or whatever you have named it.
3: Navigate to the search box in the top-right of your PC’s screen and type “fileextension:” and after which type the file extension. If you are looking for malicious executables, an example may be “fileextension:exe”. After doing that, leave a space and type the file name you believe the malware has created. Here is how it may appear if your file has been found:
N.B. We recommend to wait for the green loading bar in the navination box to fill up in case the PC is looking for the file and hasn’t found it yet.
For Older Windows Operating Systems
In older Windows OS’s the conventional approach should be the effective one:
1: Click on the Start Menu icon (usually on your bottom-left) and then choose the Search preference.
2: After the search window appears, choose More Advanced Options from the search assistant box. Another way is by clicking on All Files and Folders.
3: After that type the name of the file you are looking for and click on the Search button. This might take some time after which results will appear. If you have found the malicious file, you may copy or open its location by right-clicking on it.
Now you should be able to discover any file on Windows as long as it is on your hard drive and is not concealed via special software.
Before starting “Step 4”, please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.
Step 4: Scan for DocuSign Phishing Scam with SpyHunter Anti-Malware Tool


Martin Beltov
Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.
Preparation before removing DocuSign Phishing Scam.
Before starting the actual removal process, we recommend that you do the following preparation steps.
- Make sure you have these instructions always open and in front of your eyes.
- Be patient as this could take a while.
Step 1: Uninstall DocuSign Phishing Scam and related software from Windows
Here is a method in few easy steps that should be able to uninstall most programs. No matter if you are using Windows 10, 8, 7, Vista or XP, those steps will get the job done. Dragging the program or its folder to the recycle bin can be a very bad decision. If you do that, bits and pieces of the program are left behind, and that can lead to unstable work of your PC, errors with the file type associations and other unpleasant activities. The proper way to get a program off your computer is to Uninstall it. To do that:






Step 2: Clean your Browsers from DocuSign Phishing Scam.








2. Select the “Add-ons” icon from the menu.
3. Select the unwanted extension and click “Remove“
4. After the extension is removed, restart Mozilla Firefox by closing it from the red “X” button at the top right corner and start it again.
2. Move the cursor over “Tools” and then from the extended menu choose “Extensions“
3. From the opened “Extensions” menu locate the unwanted extension and click on its “Remove” button.
4. After the extension is removed, restart Google Chrome by closing it from the red “X” button at the top right corner and start it again.
2. Click on the gear icon labeled ‘Tools’ to open the drop menu and select ‘Manage Add-ons’
3. In the ‘Manage Add-ons’ window.
4. Select the extension you want to remove and then click ‘Disable’. A pop-up window will appear to inform you that you are about to disable the selected extension, and some more add-ons might be disabled as well. Leave all the boxes checked, and click ‘Disable’.
5. After the unwanted extension has been removed, restart Internet Explorer by closing it from the red ‘X’ button located at the top right corner and start it again.
2. Open the drop menu by clicking on the icon at the top right corner.
3. From the drop menu select “Extensions”.
4. Choose the suspected malicious extension you want to remove and then click on the gear icon.
5. Remove the malicious extension by scrolling down and then clicking on Uninstall.
Step 3: Clean any registries, created by DocuSign Phishing Scam on your computer.
The usually targeted registries of Windows machines are the following:
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
You can access them by opening the Windows registry editor and deleting any values, created by DocuSign Phishing Scam there. This can happen by following the steps underneath:






Before starting “Step 4”, please boot back into Normal mode, in case you are currently in Safe Mode.
This will enable you to install and use SpyHunter 5 successfully.
Step 4: Scan for DocuSign Phishing Scam with SpyHunter Anti-Malware Tool


Martin Beltov
Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.
Preparation Phase:
Before starting to follow the steps below, be advised that you should first do the following preparations:
- Backup your files in case the worst happens.
- Make sure to have a device with these instructions on standy.
- Arm yourself with patience.
Step 1: Uninstall DocuSign Phishing Scam and remove related files and objects
1. Hit the ⇧+⌘+U keys to open Utilities. Another way is to click on “Go” and then click “Utilities”, like the image below shows:
- Go to Finder.
- In the search bar type the name of the app that you want to remove.
- Above the search bar change the two drop down menus to “System Files” and “Are Included” so that you can see all of the files associated with the application you want to remove. Bear in mind that some of the files may not be related to the app so be very careful which files you delete.
- If all of the files are related, hold the ⌘+A buttons to select them and then drive them to “Trash”.
In case you cannot remove DocuSign Phishing Scam via Step 1 above:
In case you cannot find the virus files and objects in your Applications or other places we have shown above, you can manually look for them in the Libraries of your Mac. But before doing this, please read the disclaimer below:
You can repeat the same procedure with the following other Library directories:
→ ~/Library/LaunchAgents
/Library/LaunchDaemons
Tip: ~ is there on purpose, because it leads to more LaunchAgents.
Step 2: Remove DocuSign Phishing Scam – related extensions from Safari / Chrome / Firefox






Step 3: Scan for and remove DocuSign Phishing Scam files from your Mac
When you are facing problems on your Mac as a result of unwanted scripts and programs such as DocuSign Phishing Scam, the recommended way of eliminating the threat is by using an anti-malware program. Combo Cleaner offers advanced security features along with other modules that will improve your Mac’s security and protect it in the future.


Martin Beltov
Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.