Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Christmas Phishing Surge Chains Docusign Spoofing with Identity Theft Questionnaires

Posted on January 6, 2026January 6, 2026 By CWS

The vacation season has introduced with it a surge in refined phishing assaults that mix two harmful techniques: credential harvesting by way of spoofed Docusign notifications and id theft by way of pretend mortgage software types.

These coordinated campaigns exploit the seasonal chaos of overloaded inboxes and monetary stress that peaks throughout Christmas and the New Yr interval.

Risk actors are making the most of the belief customers place in acquainted enterprise workflows, notably doc evaluate processes, to compromise each private and company knowledge on an unprecedented scale.

The assault marketing campaign depends on convincing customers that they should evaluate accomplished paperwork through the busy vacation interval.

Fraudsters ship emails showing to come back from Docusign with authentic-looking branding and footers, however these messages originate from suspicious domains like jritech.store somewhat than professional Docusign servers.

Docusign lure e mail (Supply – Forcepoint)

The emails reference pretend Christmas-themed paperwork reminiscent of wine orders, creating a way of legitimacy that encourages fast clicks with out verification.

When customers click on the Evaluate Doc button, they’re redirected by way of a number of internet hosting platforms together with Fastly, Glitch, and Surge.sh earlier than touchdown on credential harvesting pages designed to steal company e mail logins.

Forcepoint analysts recognized this refined menace chain throughout their X-Labs analysis in late December, monitoring how the assaults are structured and discovering the supporting infrastructure that permits the fraud.

Credential harvesting web page (Supply – Forcepoint)

The researchers famous that the second wave of the marketing campaign introduces a separate however complementary assault vector concentrating on private monetary info somewhat than company credentials.

These vacation mortgage spam emails promise fast money, low rates of interest, and pressing approvals to seize delicate private knowledge.

The core assault mechanism includes a multi-stage id theft questionnaire hosted on christmasscheercash.com that walks victims by way of a misleading knowledge assortment course of.

Xmas Mortgage Supply (Supply – Forcepoint)

The shape begins innocuously by asking how a lot cash the sufferer wants, with choices starting from 100 to 50,000 {dollars}.

It then step by step progresses to requesting primary info like title, e mail, and cellphone quantity, which seems regular for any mortgage software.

The questionnaire continues by asking about residence possession, car possession, employer particulars, and revenue info, sustaining the facade of legitimacy all through this part.

Financial institution element harvesting (Supply – Forcepoint)

Nevertheless, the true goal turns into clear within the remaining phases when the shape requests full banking info. Victims are requested to supply routing numbers, account numbers, and different delicate particulars underneath the pretense of depositing mortgage funds.

After submission, customers are redirected to further fraud websites like thepersonalfinanceguide.com, which request the identical info once more and expose victims to infinite mortgage provide spam.

This handoff sample is commonplace in id theft ecosystems designed to maximise knowledge seize and monetization throughout a number of fraudulent platforms.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Chains, Christmas, Docusign, Identity, Phishing, Questionnaires, Spoofing, Surge, Theft

Post navigation

Previous Post: Dozens of Major Data Breaches Linked to Single Threat Actor
Next Post: Sophisticated ClickFix Campaign Targeting Hospitality Sector

Related Posts

APT-C-60 Attacking Job Seekers to Download Weaponized VHDX File from Google Drive to Steal Sensitive Data Cyber Security News
How SOC Teams Detect Can Detect Cyber Threats Quickly Using Threat Intelligence Feeds Cyber Security News
Apple Warns Of Series Mercenary Spyware Attacks Targeting Users Devices Cyber Security News
New ‘Sindoor Dropper’ Malware Targets Linux Systems with Weaponized .desktop Files Cyber Security News
Cybersecurity Industry Gains $1.7 Billion to Develop Cutting-Edge Protection Technologies Cyber Security News
Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark