See how AI is powering the 5-stage social engineering attack chain — and how to break it (opens in new tab)
Threat Intelligence

How Attackers Weaponize Canva, DocHub, and Your SaaS Stack

Stop SaaS-orchestrated phishing. See how attackers weaponize Canva and DocHub to bypass SEGs and how Unified SED dismantles high-trust attacks quickly.

March 26, 2026
How Attackers Weaponize Canva, DocHub, and Your SaaS Stack

Your Secure Email Gateway (SEG) is built on a fundamental law: Trust the reputable.

When an email arrives from Google.com, Canva.com, or Dochub.com, your security stack sees a 100% pass rate on SPF, DKIM, and DMARC. It sees a domain with a massive reputation score. It seems clean, right?

But for a modern attacker, these trusted SaaS platforms are the ultimate delivery vehicle. By weaponizing the built-in sharing and notification features of legitimate collaboration apps, threat actors have found a way to ride the rails of your most trusted services to deliver malicious payloads directly to your inbox.

In this blog, we’ll break down the shift from spoofed domains to abuse" infrastructure and why a Unified Social Engineering Defense (SED) is the only way to stop technically perfect attacks.

The Attack Flow: Legitimate Infrastructure, Malicious Intent

Traditional phishing relies on look-alike domains (e.g., d0chub.com). These are increasingly easy for modern filters to catch.

The new wave of SaaS-orchestrated phishing is different: The attacker never sends the email. The platform sends it for them. Here’s how it works.

1. Create the Payload

The attacker creates a legitimate account on a service like Canva, DocHub, Google Docs, or Notion. They design a document that looks like an internal invoice, a new HR policy, or a mandatory signature request.

2. The “Share” Feature

Instead of downloading the file and emailing it, the attacker uses the platform’s "Share" or "Invite to Edit" feature. They enter the victim's email address and click "Send."

3. The (Seemingly) Clean Notification

The victim receives a notification email.

Canva Support

Because the email is legitimately generated by the SaaS platform's own servers, it bypasses almost every traditional phishing detection mechanism.

Why This Attack is So Effective

Attackers are taking advantage of human trust, not just your technical controls. Here are a few reasons why this works and how attackers do it.

The Psychology of Brand Impersonation

Attackers use display name manipulation to increase urgency. A victim doesn't see a random email; they see:

"HR {Your Company Name} via DocHub"

Subject: ACTION NEEDED: Sign ASAP to complete the process

DocHub View Document Screenshot

By the time the user clicks "view document," they have already seen two layers of trust: a recognized brand name and a trusted SaaS domain.

Hidden Malicious Links

Legacy SEGs scan the email for malicious links. In this scenario, the email contains a link to a legitimate Canva design or Google Doc.

The actual phishing link (hosted on Firebase, Google Cloud Storage, or Netlify) is buried inside that document. This two-stage jump makes it invisible to standard gateway crawlers.

Legacy DRP vs. Unified Social Engineering Defense (SED)

Digital Risk Protection (DRP) on its own is siloed and reactive . If you are waiting for a domain to be flagged as malicious to block it, you’ve already lost the race. Here’s why:

  • Legacy DRP: Scans for domain spoofing. It is powerless when the attacker uses the real Canva.com.
  • Unified SED: Uses agentic AI and a real-time Threat Graph to analyze the intent and behavior of the campaign across multiple channels.

To stop SaaS abuse, you need to fight AI with AI. Here’s how.

The Doppel Moat: Velocity, Volume, and Variety

  • Velocity: While a human analyst is triaging a ticket, an attacker can spin up 1,000 unique Canva lures. Doppel’s AI agents respond quickly to identify the pattern and execute takedowns in minutes.
  • Volume: Rather than manual queues, our autonomous agents dismantle attacker infrastructure—even when it's hosted on trusted cloud providers.
  • Variety: Attackers pivot. If you block the Canva link, they move to DocHub or an SMS follow-up. Doppel sees the whole agentic AI campaign, linking these disparate signals into a single Threat Graph to stop the pivot before it happens.

3 Ways to Protect Your Organization

To defend against the clean domain paradox, your security teams must move from alert-centric to outcome-centric defense. Here are 3 essentials for success.

  1. Monitor for SaaS-invite patterns: Look for collaboration invites from unknown external senders that contain keywords like "invoice," "payment," or "urgent."
  2. Verify intent, not just authentication: A "Pass" on DMARC is no longer a signal of safety. Your defense must analyze the payload inside the shared document.
  3. Harden the human perimeter: Traditional SAT fails here because the email looks totally real. You need hyper-realistic simulations that train users to recognize the SaaS-sharing tactic specifically.

The Bottom Line

It’s a hard truth, but attackers have figured out that the best way to get past your security is to use the tools your employees already trust.

And it works. By abusing the trustworthiness of companies like Google and Canva, they have achieved a 95% drop in the cost of a successful breach.

Don’t let them get any further.

Schedule a demo to see how Doppel’s AI-native Social Engineering Defense platform unifies DRP and HRM to stop SaaS-orchestrated attacks before they scale.

Learn how Doppel can protect your business

Join hundreds of companies already using our platform to protect their brand and people from social engineering attacks.