Take action to avoid a devious new phishing scam • Blisstech Solutions

Another day, another scam. And this is a sneaky one.

Cybercriminals are getting smarter. This recent malware threat is unusually smart. It impersonates a highly trusted brand name to get a foot in the door.

Targets receive a convincing email that appears to come from the widely used e-signature platform, DocuSign.

Attached to the email is a blank image that’s loaded with empty SVG files, which are carefully encoded inside an HTML file attachment (stay with us here).

In short, it’s very clever and it’s tricking its way past a lot of security software.

That puts businesses like yours at risk. Because code within the image sends people to a malicious URL.

Open the attachment and you could unwittingly install malware onto your device – or even your network – which risks exposing your data and leaving you open to a ransomware attack.

Recently, there’s been a wave of HTML attachment attacks on small and medium-sized businesses, so it’s clear that companies need to take action to stay ahead of the criminals.

If you use software to sign documents electronically, double-check that emails are genuine before opening any attachments.

There’s a reason why criminals have chosen to impersonate a trusted name.

Taking things a step further, you could block all emails with this type of attachment, to prevent employees from being exposed to scam emails in the first place.

If you’d like any further advice, or help implementing extra security measures, get in touch.

More Content

What to do when disaster strikes: Creating an Incident Response Plan

Your business has firewalls, the latest security software, multi-factor authentication, and, of course, uncrackable passwords. You may even have Cyber Essentials—high five. But… It’s still not enough to protect you from 100% of cyber attacks. Completely watertight...

SharePoint made simple: How to supercharge your business

Still juggling files across laptops, Dropbox, and endless email chains? That chaos is costing you time, money, and sanity. Our latest guide shows you how to swap the mess for one secure, central hub where your team can collaborate seamlessly. Without stress or...
Unwrap the gift of knowledge: 5 free AI courses by Microsoft

Unwrap the gift of knowledge: 5 free AI training courses by Microsoft

Microsoft has a little business-boosting gift that you won’t want to miss out on… five free courses about AI. We have the details, and the links to the courses.

Why you’re better off in a contract with your IT company

Imagine this: Your business stops working due to a tech issue like malware, data loss or computer malfunction, resulting in a loss of productivity and revenue.  Now, think about your current IT support situation. Do you have an IT support contract, or do you only call...

Here’s how cyber criminals try to hack your accounts while you sleep

Have you ever received a notification on your phone while you’re sleeping, asking if it’s really you logging in?
It’s called a fatigue attack and Microsoft Authenticator’s latest feature will help to protect you.

BEC attacks illustrated. Image of a hacker standing behind a computer looking menacing

Business Email Compromise (BEC) attacks are rising

Business Email Compromise (BEC) has emerged as a significant threat to businesses worldwide in recent years. As of March 2025, there has been a staggering 30% increase in BEC attacks. In late February 2025, Microsoft Defender identified nearly 2 million phishing...

Tech Tip: How to add your availability to an Outlook Email

Today's Tuesday Two Minute Tech Tip will save you time when arranging meetings. Are you wasting time when trying to book meetings by constantly going back and forth with people trying to find a suitable time? There is a better way to find time for a meeting by using...
Are you ready for next-gen email security? (YES!)

Are you ready for next-gen email security? (YES!)

Sick of spam emails? We have details of a cool new tool to help keep us better protected.

3 essential security tools for every business

Your data is one of your most valuable business assets. Keeping it safe should be one of your main priorities.

Antivirus Isn’t Enough. Why You Need EDR for Bulletproof Security

In the ancient days of dial-up internet, a simple antivirus program might have kept your computer safe. Today's digital landscape, however, is a minefield of constantly evolving cyber threats. Ransomware, phishing attacks, and zero-day exploits plague businesses and...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05