Threat Intelligence

The DocuSign Template That Forgot to Replace 'Putyourlinkhere'

Written by Audian Paxson | Dec 29, 2025 6:30:00 AM
TL;DR An e-signature phishing email impersonating DocuSign used a compromised IT services company's email address as the From header, but sent from a ColoCrossing hosting IP with no relationship to the claimed sender. SPF returned a PermError due to an invalid mechanism in the spoofed domain's record. DKIM was absent. DMARC failed. Despite this, Microsoft's composite authentication passed (reason=703) and the message was delivered at SCL 1. The phishing template included an exposed anchor title attribute reading 'Putyourlinkhere,' a fabricated security code, and a credential-harvesting CTA routed through a Google.it open redirect to a compromised Brazilian domain.
Severity: High Credential Theft Saas Impersonation MITRE: T1566.002 MITRE: T1036.005 MITRE: T1598.003

Phishing kits are reusable. That is their advantage and their weakness. When an operator deploys a kit without replacing every placeholder, the artifacts they leave behind become forensic evidence, revealing the template's structure, the operator's sloppiness, and sometimes the kit's lineage across campaigns. In this case, the artifact was a single HTML attribute: title="Putyourlinkhere".

A DocuSign-themed credential-harvesting email arrived at a managed IT services provider, spoofing an internal employee's address as the From header. The message failed SPF (PermError), had no DKIM signature, and failed DMARC. Microsoft's composite authentication still passed it. Themis flagged it at 90% confidence as credential theft.

The Template Left Its Fingerprints

The phishing email mimicked a DocuSign e-signature notification, claiming "All parties have completed" a document titled "Executed NDA FY26 Agreement.pdf." The primary call-to-action button read "REVIEW & SIGN DOCUMENT" and was styled in DocuSign's blue (#275EF5) with white text. At a glance, it could pass for a real DocuSign notification.

But the HTML told a different story. The anchor tag wrapping the CTA button carried title="Putyourlinkhere", a placeholder the kit operator never replaced. This attribute is invisible in most email clients because title attributes render only on hover in desktop browsers, not in mobile email apps where most recipients read messages. The operator likely never saw it.

The template also contained duplicate content blocks, broken image references (empty src attributes on the DocuSign logo), and repeated instances of the recipient's email address in places where DocuSign would normally display the signer's name. These are hallmarks of a mass-produced phishing kit that uses email address injection as a personalization shortcut.

A fabricated security code (A6756F11989F4294AD8256DB8CB89D713) added false urgency, instructing recipients to "Click 'Access Documents' and enter the security code." Legitimate DocuSign workflows do not distribute access codes via email body text in this format.

The Google.it Redirect Chain

The CTA button linked to a Google.it redirect URL with the q= parameter pointing to marmotaweb[.]com[.]br/.io/87656/. This is a Google redirect that resolves the q= parameter to the attacker's landing page. Using Google's redirect service means the initial URL points to a Google-owned domain, which some link-scanning engines evaluate as clean without following the redirect to the final destination.

The landing page at marmotaweb[.]com[.]br/.io/87656/ is a compromised Brazilian domain. WHOIS shows a Brazilian registrant unrelated to DocuSign, and the domain hosts what appears to be a legitimate business website at its root. The attacker placed the credential-harvesting page in a subdirectory, piggybacking on the domain's existing reputation.

The URL also included a base64-encoded fragment (#87634598Family=am9lLmdyYWJvd3NraUBzZWVkc3BhcmsuY29t) that decodes to the recipient's email address. This pre-populates the credential form with the target's identity, reducing friction and increasing the likelihood of a successful harvest.

See Your Risk: Calculate how many threats your SEG is missing

Authentication: Three Failures, One Pass

The From header used a real employee's address at a managed IT services provider. But the message originated from 198.23.177.24, a ColoCrossing hosting IP with no relationship to the spoofed domain.

SPF returned a PermError because the spoofed domain's SPF record contained an invalid mechanism that the evaluating gateway could not process. DKIM was absent entirely (dkim=none). DMARC failed because neither SPF nor DKIM aligned with the From header domain.

Despite these three failures, Microsoft's composite authentication (compauth) returned pass with reason=703. Reason 703 indicates the message "appears to be from a legitimate sender" based on heuristic signals, overriding the explicit authentication failures. The message was delivered at SCL 1.

IRONSCALES Adaptive AI evaluated the message at 90% confidence as credential theft. Community intelligence provided additional confirmation, with both community reputation signals and historical phishing resolutions supporting the classification. The message was automatically resolved as phishing and the affected mailbox was quarantined.

MITRE ATT&CK Alignment

TechniqueIDApplication
Phishing: Spearphishing LinkT1566.002Credential-harvesting link via Google redirect to compromised domain
Match Legitimate Name or LocationT1036.005DocuSign branding and e-signature workflow impersonation
Spearphishing for InformationT1598.003Credential collection via fake e-signature login page

IOC Summary Table

TypeIndicatorContext
Sending IP198[.]23[.]177[.]24ColoCrossing hosting, PTR: 198-23-177-24-host.colocrossing.com
Display NameeDocu_SignMisspelled DocuSign branding in From display name
Redirect Domaingoogle[.]itGoogle redirect used to wrap phishing destination
Phishing Domainmarmotaweb[.]com[.]brCompromised Brazilian domain hosting credential form
Phishing Path/.io/87656/Subdirectory on compromised domain
Template Artifacttitle="Putyourlinkhere"Unsubstituted phishing kit placeholder
Fabricated CodeA6756F11989F4294AD8256DB8CB89D713Fake security/access code in email body
SPF ResultPermErrorInvalid mechanism in spoofed domain's SPF record
DKIM ResultNoneNo DKIM signature present
DMARC ResultFailNo aligned authentication
CompAuth ResultPass (reason=703)Heuristic override of authentication failures
SCL1Low spam confidence, delivered to inbox

What This Case Demands From Your Stack

When authentication fails three ways and the message still reaches the inbox, the detection surface must extend beyond authentication.

Inspect HTML attributes, not just visible content. Title attributes, alt text, and class names in phishing emails frequently contain kit artifacts that are invisible to the recipient but detectable by automated inspection. These artifacts are high-confidence phishing indicators with near-zero false positive rates.

Follow Google redirects to their destination. Any link that uses google.com/url, google.it/url, or similar redirect services should be evaluated at the final destination, not at the wrapper domain. If your link-scanning engine stops at Google, it is blind to the actual threat.

Treat compauth reason=703 with caution. A composite authentication pass based on heuristics, not cryptographic verification, should not override three explicit authentication failures. Audit your transport rules to confirm that compauth results are weighted appropriately against SPF, DKIM, and DMARC signals.

Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.