When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Business email compromise

The second stage includes sifting through the documents found in the victims DocuSign account.

That way they can identify high-value targets and formulate the right throw in of approach for maximum efficiency.

Electronic Signature

They often also look for compromising information which could be used in blackmail.

More from TechRadar Pro