Gold Laptop with Skull - Malware Concept
Home Malware DocuSign ‘Completed Optus Agreement’ Malware Email

DocuSign ‘Completed Optus Agreement’ Malware Email

by Brett M. Christensen

This email, which purports to be from electronic signature service DocuSign, claims that your agreement with Australian telecommunications company Optus has been completed. It urges you to open an attached file to view the signed agreement. 

The email features the Optus logo and includes an attached .zip file named ‘Optus agreement no’.

However, the email is not from DocuSign and has no connection to Optus.

And the attachment does not contain any sort of ‘agreement’ document, signed or otherwise. Instead, the email contains a dangerous executable file that, if opened, can install malware on your computer.

Once installed, the malware may download even more malware that can steal passwords and other personal information from the infected computer. The malware may also allow criminals to take control of the computer. In some cases, the initial malware component may download ransomware that can lock your files and then demand a fee to retrieve them.

The criminals know that at least a few less experienced computer uses may be panicked into opening the attached file in the mistaken belief that their identity or information has been used without their knowledge to sign up for an Optus agreement. Recipients who have recently conducted business with Optus may also be especially vulnerable to this attack.

If you receive this email, do not open any attachments or click any links that it contains. 


Subject: Completed: Optus agreement no PDJT-989812 

Your agreement has been completed

[Name Removed],

All parties have completed the envelope ‘Optus agreement no PDJT-989812’.

Please find attached the signed agreement.

This message was sent to you by [Name Removed] who is using the DocuSign Electronic Signature Service. If you would rather not receive email from this sender you may contact the sender with your request.

Docusign Malware Email

Importance Notice

After considerable thought and with an ache in my heart, I have decided that the time has come to close down the Hoax-Slayer website.

These days, the site does not generate enough revenue to cover expenses, and I do not have the financial resources to sustain it going forward.

Moreover, I now work long hours in a full-time and physically taxing job, so maintaining and managing the website and publishing new material has become difficult for me.

And finally, after 18 years of writing about scams and hoaxes, I feel that it is time for me to take my fingers off the keyboard and focus on other projects and pastimes.

When I first started Hoax-Slayer, I never dreamed that I would still be working on the project all these years later or that it would become such an important part of my life. It's been a fantastic and engaging experience and one that I will always treasure.

I hope that my work over the years has helped to make the Internet a little safer and thwarted the activities of at least a few scammers and malicious pranksters.

A Big Thank You

I would also like to thank all of those wonderful people who have supported the project by sharing information from the site, contributing examples of scams and hoaxes, offering suggestions, donating funds, or helping behind the scenes.

I would especially like to thank David White for his tireless contribution to the Hoax-Slayer Facebook Page over many years. David's support has been invaluable, and I can not thank him enough.

Closing Date

Hoax-Slayer will still be around for a few weeks while I wind things down. The site will go offline on May 31, 2021. While I will not be publishing any new posts, you can still access existing material on the site until the date of closure.

Thank you, one and all!

Brett Christensen,