Back to Examples
PHISHINGRisk Level: 9/10

Classic DocuSign impersonation phishing attack with heavily obfuscated links and domain spoofing.

HIGH ConfidenceCredential Phishing

Email Details

From
user@example.com (anonymized)
Subject
Signature Requested Completed Assigned Doc-ID=e5690eb3b95c04addba74cc555617e01
Date
January 20, 2026

Key Findings

  • Email impersonates DocuSign but originates from unrelated domain aqualandia.es with no legitimate connection to DocuSign services

  • The primary link is heavily obfuscated through multiple URL protection services, ultimately leading to phasesofmylife.com which appears to be a phishing domain

  • Authentication shows only SPF pass while DKIM and DMARC are not available, indicating potential spoofing of the sender domain

Detailed Analysis

This email is a classic DocuSign impersonation phishing attack. While the content appears professionally formatted and uses legitimate DocuSign branding language, several critical technical indicators reveal its malicious nature. The sender domain has no legitimate relationship to DocuSign, and the email lacks proper DKIM/DMARC authentication that genuine DocuSign emails would possess.

The most damning evidence is the link obfuscation chain. The email contains a URL that passes through Sophos protection services and TitanHQ link analysis before ultimately directing to "phasesofmylife.com/fola" - a domain that has no connection to DocuSign's legitimate services. This multi-layered URL wrapping is a common technique used by phishers to evade security scanning and make their malicious links appear legitimate by routing through trusted security vendors.

The email targets a specific individual and creates urgency by claiming they have received a document requiring their signature. This social engineering approach is designed to prompt quick action without scrutiny. The professional disclaimer at the bottom referencing Nomura appears to be copied from a legitimate financial institution to add credibility, but this is simply borrowed content to make the phishing email appear more authentic.

Recommended Actions

  • Do not click any links or download any attachments from this email

  • Report this email to your IT security team and email provider as a phishing attempt

  • Verify any legitimate document sharing requests through independent channels (call the sender directly using known contact information)

Get this level of protection for every email

ForwardToSafety analyzes every suspicious email with AI-powered detection to keep you safe from phishing attacks.

View Pricing Plans