Blank Image Phishing Scams
Phishing Image

Blank Image Phishing Scams

Most email providers have security filters that check emails for malicious links or attachments. You may feel like you can rely on these filters and, as a result, trust that emails sent to your inbox are safe. Unfortunately, cybercriminals can take advantage of this trust by using blank image phishing to bypass security filters.

The scam starts with a fake email that appears to be from DocuSign. The email asks you to review and sign a document as soon as possible and contains an HTML attachment. Instead of an important document, the attachment is a blank SVG with malicious code. Because this code is hidden inside the attachment, the email can bypass security filters. If you download the attachment, the code will redirect you to a malicious website that will prompt you to enter sensitive information. If you enter this information, cybercriminals can use it for their own purposes.

Follow the tips below to stay safe from similar scams:

  • Always think before you download an attachment. This type of cyberattack is designed to trick you into downloading attachments impulsively.
  • Never click a link or download an attachment in an email that you aren’t expecting. While this attack targets DocuSign users, this scam could be used with any organization that manages electronic agreements.

Enable multi-factor authentication (MFA) on your accounts when it is available. MFA adds an extra layer of security and lowers the chance of cybercriminals logging in to your account.


Knowbe4 Logo

Stop, Look, and Think. Don’t be fooled.

Protect your network! Learn more about security awareness training for your team.

Like this article?

Share on Facebook
Share on Twitter
Share on Linkdin
Share on Pinterest

More Posts

Man Laptop Cybersecurity
Cybersecurity

SMB Cyber Targets

Majority of Cyber Incidents Now Target Small & Medium Businesses (SMBs) Cybercrime is a pervasive threat that affects individuals across all socioeconomic backgrounds, yet its

Doctor Hands Laptop Image
Ransomware

Unveiling the Human Element in Ransomware Attacks

In recent years, high-profile ransomware attacks have shaken industries and organizations worldwide. As technology advances, so do the tactics employed by threat actors. However, a

SuperPod with WiFi 6E

Plume SuperPod WiFi 6E Specs

SuperPod with WiFi 6

Plume SuperPod WiFi 6 Specs

SuperPod

Plume SuperPod Secs