The DocuSign Email That Wasn’t – A Three-Redirect Credential Harvest
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是攻击者发送了一个看起来像DocuSign的通知邮件,里面有“查看并签署”的按钮。点击后会通过Google Maps的重定向跳转到一个亚马逊S3托管的页面,用来收集用户的凭证。这个重定向链让URL扫描器无法检测到恶意链接,因为扫描器只检查了第一个跳转的Google域名,而后续的S3页面则没有被扫描到。 攻击者还用了真实的法律事务所的页脚和银行参考信息,增加了邮件的可信度。IronScales的自适应AI检测到了发送者基础设施和品牌身份之间的行为不匹配,在第一次点击之前就标记了这个威胁。 总结一下,文章描述了一个复杂的钓鱼攻击,利用多级重定向和真实信息来欺骗用户,并且提到了现有的安全措施如何未能阻止这种攻击,最后IronScales的技术成功拦截了它。 现在我要把这些要点浓缩到100字以内。要确保涵盖攻击手段、重定向链、绕过扫描的方法以及IronScales的作用。同时保持语言简洁明了。 </think> 攻击者利用DocuSign通知邮件伪装钓鱼链接,通过Google Maps和Amazon S3重定向链跳转至 credential harvesting页面。该链路绕过URL扫描器检测,并使用真实法律事务所页脚增加可信度。IronScales自适应AI通过检测发送者基础设施与品牌身份的行为不匹配,在首次点击前识别并拦截威胁。 2026-3-4 00:20:30 Author: securityboulevard.com(查看原文) 阅读量:14 收藏

TL;DR Attackers sent a convincing DocuSign notification with a “Review & Sign” button that chained through Google Maps redirects to an Amazon S3-hosted credential harvesting page. The redirect chain defeated URL scanners, and real law-firm footers added legitimacy. IRONSCALES Adaptive AI flagged the behavioral mismatch between sender infrastructure and brand identity before the first click.

Severity: High
Credential Harvesting
Brand Impersonation
MITRE: T1566.002
MITRE: T1598.003

The “Review & Sign” button looked exactly like every DocuSign notification you’ve ever received. Same blue branding, same layout, same urgency. But the button didn’t point to DocuSign. It pointed to Google Maps > then to Amazon S3 > then to a credential harvesting page that looked close enough to a Microsoft login to fool anyone moving fast.

A Redirect Chain Built to Dodge Scanners

The email arrived at a mid-size financial services firm on a Monday morning, formatted as a forwarded legal document awaiting signature. The body included realistic law-firm footers, a bank reference, and multiple legitimate links — all designed to make the one malicious link blend in.

That malicious link: a maps[.]google[.]be redirect that resolved to a public S3 bucket hosting an HTML page at bucket-secure-cdn-cdn-media-static[.]s3[.]us-east-1[.]amazonaws[.]com/about[.]html. The page mimicked a Microsoft 365 login.

The redirect chain is the whole game here. URL scanners check the first domain, Google, and stop. The S3 destination isn’t evaluated until someone clicks, and by then, the scanner has already marked it safe.

Attack Flow

DocuSign Lure Email

Google Maps Redirect

Amazon S3 HTML Page

Credential Harvest

See Your Risk: Calculate how many threats like this your gateway is missing

Why the Gateway Gave It a Pass

Email authentication didn’t help. SPF passed, the sending server was legitimately authorized by the envelope domain, a small Japanese web services company with no connection to DocuSign. No DKIM signature. DMARC returned a best-guess pass.

So the email arrived with clean authentication, a trusted redirect domain (Google), and a hosting provider (AWS) that no blocklist is going to flag broadly. The attacker’s infrastructure looked legitimate at every checkpoint.

Check Result Why It Didn’t Help
SPF Pass ✓ Sending server was authorized – by the wrong domain
DKIM None No signature to validate
DMARC Best-guess Pass No DMARC record  – receiver inferred “pass”
URL Scan Safe ✓ Only scanned first hop (Google domain)

IRONSCALES Adaptive AI caught what the static checks missed: the behavioral mismatch between the sender’s domain infrastructure (a Japanese web hosting provider) and the claimed identity (DocuSign). Combined with community-reported patterns matching the same S3 bucket across three other organizations, the platform quarantined the message within 90 seconds of delivery, before any recipient clicked.

Your Takeaway

If your email security relies on URL reputation at the first hop, redirect-chain attacks will sail through. Ask your security team: does our scanning follow redirects to the final destination? If the answer is “sometimes” or “I’m not sure” – that’s the gap attackers are counting on.

Get a Demo: See how IRONSCALES detects redirect-chain phishing in real time

*** This is a Security Bloggers Network syndicated blog from Blog authored by Themis. Read the original post at: https://ironscales.com/blog/the-docusign-email-that-wasnt-a-three-redirect-credential-harvest


文章来源: https://securityboulevard.com/2026/03/the-docusign-email-that-wasnt-a-three-redirect-credential-harvest/
如有侵权请联系:admin#unsafe.sh