publishing date icon
October 27, 2023
read time icon
5 min. read

Threat feed week 43: DocuSign, Microsoft, QuickBooks, DHL, Geek Squad, MetaMask, Luxembourg police, and German postal service impersonations

Author image
Threat Analyst Team
Post hero image

Table of contents

share this post

DocuSign and Microsoft impersonations

“Document89272-01 Docs Via E-Sign #23(REVISED)”

Hox rating: ★★✩✩

Threat type: Bulk phishing

Payload: Malicious link

Region: Europe

Date: 23.10.2023

This phishing email aims to get the recipient to click the malicious link embedded in the message.

DocuSign and Microsoft impersonations “Document89272-01 Docs Via E-Sign #23(REVISED)”

The link leads to a malicious credential-harvesting website.

Analyst: Wivi Koenkytö

DocuSign impersonation with company logo and QR code

“Approval-Request-Required for institute at 20:11:00_17/10,_Please_Complease_Document.”

Hox rating: ★★✩✩

Threat type: Bulk phishing

Payload: Malicious QR code

Region: Global

Date: 23.10.2023

This phishing email encourages recipients to scan an embedded QR code while pretending to be an official DocuSign communication.

DocuSign impersonation with company logo and QR code “Approval-Request-Required for institute at 20:11:00_17/10,_Please_Complease_Document.”

What sets this campaign apart is its use of the recipient’s company’s logo, adding a layer of perceived authenticity.

Analyst: Sampo Lenkola

Luxembourg police impersonation

“RE: Last reminder before increase.”

“RE: Dernière relance avant majoration.”

Hox rating: ★★✩✩

Threat type: Bulk phishing

Payload: Malicious link

Region: Luxembourg

Date: 23.10.2023

This campaign impersonates the Luxembourg police, claiming that the recipient didn’t pay their traffic fine.

Luxembourg Police impersonation “RE: Last reminder before increase.” “RE: Dernière relance avant majoration.”

They should follow the link and pay online to avoid sanctions, including a fine increase. The hyperlink leads to a malicious website with a different URL than the one in the email.

Analyst: Siiri Latola

Geek Squad impersonation

“Subscription renewed”

Hox rating: ★✩✩✩

Threat type: Bulk phishing

Payload: Malicious phone number

Region: North-America

Date: 24.10.2023

This Geek Squad impersonation claims that your Geek Squad personal home subscription was just renewed for $499.99.

GeekSquad impersonation “Subscription renewed”

The goal is to get the recipient to call the provided phone number, in a panic, to cancel the subscription. After they call the number, the scammer would attempt to gain financial and personal information from the recipient.

Analyst: Minna Herlevi

DHL impersonation

“DHL package tracking - 123456789”

“Suivi de colis DHL - 123456789”

Hox rating: ★★✩✩

Threat type: Advanced campaign

Payload: Malicious link

Region: Europe

Date: 24.10.2023

This phishing email aims to get the recipient’s credentials by claiming that the package ordered by the recipient is on its way.

The link leads to a realistic but fake DHL website where the recipient is asked to pay for the shipment of their package.

Analyst: Wivi Koenkytö

MetaMask impersonation

[MetaMask] Verify Your Wallet Before October 26, 2023

Hox rating: ★★✩✩

Threat type: Bulk phishing

Payload: Malicious link

Region: Global

Date: 24.10.2023

This email falsely represents MetaMask, attempting to deceive users into verifying their wallets.

MetaMask impersonation “[MetaMask] Verify Your Wallet Before October 26, 2023”

It misleadingly uses KYC regulations to appear credible.

Analyst: Sampo Lenkola

Microsoft 2FA—Failed Verification

FW: 2FA Auth_Error

Hox rating: ★✩✩✩

Threat type: Bulk phishing

Payload: Malicious QR code

Region: Global

Date: 26.10.2023

This email impersonates Microsoft, claiming that the recipient’s two-factor authentication failed.

Microsoft 2FA—Failed Verification “FW: 2FA Auth_Error”

It claims that if the recipient doesn’t scan the QR code and follow the instructions, their email will be deactivated.

Analyst: Siiri Latola

DocuSign impersonation with QR code

Direct Deposit Information for Reimbursement Payment Agreement to be completed on October 26, 2023

Hox rating: ★★✩✩

Threat type: Bulk phishing

Payload: Malicious QR code

Region: Global

Date: 26.10.2023

This phishing email is impersonating DocuSign. The email contains a malicious QR code that claims to lead to a document.

DocuSign impersonation with QR code “Direct Deposit Information for Reimbursement Payment Agreement to be completed on October 26, 2023”

This is a very typical phishing email that includes a QR code. Even though the body of the email looks real, it doesn’t come from DocuSign.

Analyst: Kaarlo Mahlberg

QuickBooks impersonation Global

Payment of $12,800.00 was issued to you by check on 10/25/2023

Hox rating: ★★✩✩

Threat type: Bulk phishing

Payload: Malicious attachment

Region: Global

Date: 26.10.2023

This email is trying to impersonate QuickBooks. It claims that a large payment was issued to the recipient.

QuickBooks impersonation “Payment of $12,800.00 was issued to you by check on 10/25/2023”

The email also says that the recipient can find more information about the payment in the attachment. The attachment then leads the recipient to a fake login site that’s used to harvest their credentials.

Analyst: Kaarlo Mahlberg

QuickBooks impersonation Europe

“Plan Renewal Success: Payment Successfully Verified”

Hox rating: ★★✩✩

Threat type: Bulk phishing

Payload: Malicious phone number

Region: Europe

Date: 27.10.2023

This phishing email informs the recipient of their plan renewal.

QuickBooks impersonation Europe “Plan Renewal Success: Payment Successfully Verified”

The attacker’s goal is to get the recipient to call the malicious phone number to cancel the fake renewal.

Analyst: Wivi Koenkytö

German postal service impersonation

“Package is waiting for delivery”

“Paket wartet auf Lieferung”

Hox rating: ★★✩✩

Threat type: Advanced campaign

Payload: Malicious link

Region: Europe

Date: 27.10.2023

“Your delivery with the reference number CH495655217 is waiting for the payment of the fees. The shipping details are as follows.”

German postal service impersonation “Package is waiting for delivery” “Paket wartet auf Lieferung”

This phishing email aims to get the recipient to press the malicious link that most likely leads to a credential harvesting site. An interesting observation is that the attacker has used a survey service, which is why the message includes strange fields, such as “Start Survey” or this “Untitled dfasdf asdfasdf...” at the bottom of the page.

Analyst: Wivi Koenkytö

Keep up with the threat feed

Don’t miss the next threat feed, and subscribe to our newsletter for the latest feed and cybersecurity content. Stay informed and stay safe!

Subscribe to Threat Feed

Subscribe to Hoxhunt's Threat Feed to get the latest phishing threats delivered to your inbox, every Friday.

Form CTA

Hoxhunt needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.