Fake Stripe Chargeback Alert Exploits PandaDoc to Steal Business Credentials
In this phishing attack, cybercriminals spoof PandaDoc, an e-signature platform, and send the target a message posing as the support team from Stripe, a payment processing solution. Using a spoofed email address designed to appear as a real PandaDoc account, the attacker emails the target informing them they have a secured message related to payouts. Clicking on “Open the Document” redirects the recipient to a file hosted on PandaDoc that contains impersonated Stripe branding and a message warning of a significant rise in customer chargebacks. The target is informed they must verify their business email within 48 hours or risk having their payouts paused. Should the recipient click the button labeled “Validate [recipient’s email]” embedded in the file, they will be redirected to a phishing site designed to steal sensitive information.
Older, legacy email security tools struggle to accurately identify this email as an attack because it originates from a spoofed address, contains no attachments, and includes legitimate links to bypass verification checks. Modern AI-powered email security solutions detect links to suspicious domains, flag that the message is coming from an unknown sender, and recognize the mismatch between the sender and reply to addresses to correctly identify the email as an attack.
To protect against such threats, users should verify communications directly through their official dashboard rather than interacting with unexpected emails. Additionally, businesses should educate employees on phishing tactics, implement multi-factor authentication, and deploy advanced email security tools to detect and block sophisticated scams like this one.
![SCR 20250211 pwja](/_next/image?url=https%3A%2F%2Fimages.abnormalsecurity.com%2Fproduction%2Fimages%2FSCR-20250211-pwja.png%3Fw%3D1134%26h%3D958%26auto%3Dcompress%252Cformat%26fit%3Dcrop%26dm%3D1739315434%26s%3D09603811c6800f25250768ea00b59459&w=1980&q=75)
Malicious email disguised as shared document notification sent from Stripe via PandaDoc
![SCR 20250211 pxsj](/_next/image?url=https%3A%2F%2Fimages.abnormalsecurity.com%2Fproduction%2Fimages%2FSCR-20250211-pxsj.png%3Fw%3D1606%26h%3D814%26auto%3Dcompress%252Cformat%26fit%3Dcrop%26dm%3D1739315850%26s%3De493cad1b8ce5fa0cf6043e7d8a92ef8&w=1980&q=75)
File hosted on PandaDoc posing as verification request from Stripe
How Does This Attack Bypass Email Defenses?
This email attack bypasses traditional security solutions for multiple reasons, including the following:
- Spoofed Email Address: The attacker spoofs a legitimate-sounding email address, bypassing basic email verification checks and adding perceived authenticity.
- Lack of Attachments: By not including any attachments, the email avoids detection by antivirus and anti-malware systems focused on attachment-based threats.
- Legitimate Links Included: The email includes links associated with recognizable domains, which can pass through basic link verification checks due to its legitimate structure.
How Did Abnormal Detect This Attack?
How Did Abnormal Detect This Attack?
This attack was detected using AI and ML by analyzing various factors, including the following:
- Suspicious Link Analysis: Abnormal's systems scrutinize the presence of links leading to suspicious domains, triggering deeper analysis for possible malicious intent.
- Unknown Sender Consideration: The email is recognized as coming from an unknown sender who has never communicated with the recipient. Abnormal’s platform maintains a communication history and quickly flags deviations from established sender-recipient interaction patterns.
- Reply-to Address Mismatch: The email includes a reply-to address that differs from the sender's address, further raising suspicion and prompting Abnormal's systems to analyze the email more deeply.
By recognizing established normal behavior and detecting these indicators, a modern email security solution has the ability to prevent this attack from reaching inboxes.
Please note the exact detection mechanism from Abnormal Security's system might include proprietary techniques and methodologies not disclosed here.