E-Sign Credential Harvest Chains Three Brands: Epic River, Home State Bank, and ProSign

TL;DR An e-sign phishing email combined three brand identities to build trust: Epic River as the document sender, Home State Bank as the financial institution, and ProSign as the signing platform. Sent from prosignonline[.]com (registered 2017, hosted on AWS), the message passed DKIM and DMARC but soft-failed SPF via a mxthunder[.]net relay at 208[.]53[.]48[.]218. The credential harvest page at prosign[.]online returned mixed verdicts across URL scanners.

What Happened

An email presented as an e-signature notification arrived from prosignonline[.]com, a domain registered in 2017 and hosted on AWS infrastructure. The message wove together three brand identities: Epic River appeared as the document originator, Home State Bank as the financial institution involved in the transaction, and ProSign as the electronic signing platform facilitating the process.

DKIM passed. DMARC passed. SPF returned a softfail because the message was relayed through mxthunder[.]net at 208[.]53[.]48[.]218, an IP not included in the prosignonline[.]com SPF record. The softfail disposition meant most gateways treated the message as suspicious but deliverable rather than rejecting it outright.

The call-to-action directed recipients to prosign[.]online, a separate domain from the sender address. URL scanners returned mixed verdicts: some flagged it as suspicious, others marked it clean. The page was designed to harvest credentials under the guise of a document signing login.

Why It Matters

Multi-brand phishing represents an evolution in social engineering sophistication. Rather than impersonating a single entity, the attacker constructed a plausible multi-party transaction scenario. In legitimate business, e-signature workflows routinely involve a document sender (Epic River), a financial counterparty (Home State Bank), and a signing platform (ProSign). A recipient who recognizes even one of these brands may extend trust to the entire chain.

The SPF softfail is a deliberate choice. Attackers who route through relays like mxthunder[.]net accept the softfail because they know most gateway configurations will still deliver the message. The DKIM and DMARC passes provide enough authentication cover to offset the SPF result in most scoring algorithms.

The mixed scanner verdicts on prosign[.]online highlight a persistent gap in URL-based detection. When a phishing page is hosted on AWS and the domain is relatively new without negative reputation history, scanners that rely on infrastructure reputation and feed-based blocklists will return clean results. Only scanners performing real-time content analysis of the landing page would identify the credential harvest form.

How IRONSCALES Caught It

Adaptive AI email security evaluated the full behavioral context of the message: a multi-brand e-signature notification, SPF softfail through a third-party relay, and a CTA pointing to a domain different from the sender domain. Community intelligence confirmed the pattern across multiple organizations, with the prosign[.]online domain appearing in credential harvest reports from other tenants.

The sender-to-link domain mismatch (prosignonline[.]com sending, prosign[.]online harvesting) is a signal that static gateway rules frequently miss because both domains share the prosign brand name, making the discrepancy appear intentional rather than suspicious.

See Your Risk. Run a free phishing simulation to test whether multi-brand credential harvesting emails bypass your current defenses.

Indicators of Compromise

IndicatorTypeValue
Case IDInternalb7f13fe9f763896e8a98c49be8c213f7
Sender DomainDomainprosignonline[.]com
Harvest DomainDomainprosign[.]online
Relay ServiceInfrastructuremxthunder[.]net
Relay IPIP Address208[.]53[.]48[.]218
HostingInfrastructureAWS
Domain CreatedWHOIS2017
SPFAuthenticationsoftfail
DKIMAuthenticationpass
DMARCAuthenticationpass
Scanner VerdictsDetectionMixed (clean/suspicious)

MITRE ATT&CK Mapping

TacticTechniqueIDNotes
Initial AccessPhishing: Spearphishing LinkT1566.002CTA link to credential harvest page
Credential AccessInput Capture: Web Portal CaptureT1056.003Fake e-signature login page
Defense EvasionMasqueradingT1036Three legitimate brands chained for trust
Resource DevelopmentAcquire Infrastructure: DomainsT1583.001prosign[.]online registered for harvesting
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.

Explore More Articles

Say goodbye to Phishing, BEC, and QR code attacks. Our Adaptive AI automatically learns and evolves to keep your employees safe from email attacks.