Online & communicationModerate impact

The DocuSign looked 100% real. The link wasn't.

I was expecting a contract for a freelance gig, so when email arrived saying DocuSign had a document waiting, the timing felt right.

The layout matched messages I had seen from real signings before.

I clicked View document, landed on a flow that copied colours and buttons from the real product, and started typing login details before I noticed the hostname in the bar was wrong.

I closed the tab without submitting and opened DocuSign from a bookmark instead.

Fake e-sign emails harvest passwords or drop malware; because many people are mid-deal when they arrive, the click rate stays high.

I ran a malware scan and rotated passwords after realising how close I had come.

While the page loaded I was thinking about deadlines, not URLs—I almost treated the link like a calendar invite.

On the real DocuSign inbox there was no envelope from that sender; support confirmed phishing was circulating that week using the same subject lines.

I lost most of a day re-securing accounts and explaining to the client why I had delayed; the stress sat in my chest longer than the actual incident.

I do not sign from email links anymore.

I go to the provider’s site myself, log in, and open envelopes only from there.

  • Check the URL on any “sign document” page; when in doubt, open the official e-sign site directly.
  • Forward phishing to the provider’s abuse address and report to FTC (US) or local fraud lines.

For more help, see our Report a scam page and Spot and avoid scams guide.

Test your understanding

Flip each card to check your answer

True or false?

Fake e-sign emails harvest passwords or drop malware; because many people are mid-deal when they arrive, the click rate stays high.

Tap to flip
True

Fake e-sign emails harvest passwords or drop malware; because many people are mid-deal when they arrive, the click rate stays high.

← All scam stories

Need help now?