Fake Figma / Canva design file share credential phishing — impersonates Figma, Canva, Adobe XD, or Sketch with a fake "someone shared a design with you" notification requiring Google or Microsoft sign-in on a non-official domain; designers receive legitimate file-share invitations constantly and have been conditioned to click without verifying the sender domain; Proofpoint 2024: Figma impersonation phishing up 300%; Cofense 2024: design-tool lures are the fastest-growing new phishing category in tech industries
fake-figma-canva-design-file-share-phish
What this tier means
High-confidence threat indicator — phishing, impersonation, BEC, or scam pattern. Strong contributor to the trash decision.
How Gorganizer detects this
Phishing emails impersonating Figma, Canva, Adobe XD, or Sketch with a fake "someone shared a design file with you" or "you have been invited to view a prototype" notification that requires Google or Microsoft 365 credential sign-in on a non-official domain — enabling full account takeover for the design team's workspace, connected apps, and shared asset libraries. Key facts: (1) Proofpoint 2024: Figma impersonation phishing increased 300% as remote design collaboration became the default workflow for product, marketing, and engineering teams; Cofense 2024: design-tool lures represent the fastest-growing new phishing category in creative and tech industries, driven by the high frequency of legitimate file-share emails that condition recipients to click without verifying sender domains; (2) The attack is particularly effective because legitimate Figma, Canva, and Adobe XD file-share emails are received daily by designers, product managers, and marketers — the conditioning is so strong that recipients rarely check whether "noreply@figma-design-share.com" differs from "noreply@figma.com"; the email layout closely mimics the real Figma/Canva notification format, including design thumbnail previews and "Open in Figma" button styling; (3) The credential goal goes beyond just the design account: because most Figma and Canva logins are "Sign in with Google" or "Sign in with Microsoft," the harvested credentials give the attacker access to the victim's Google or Microsoft account — full email, calendar, Drive/OneDrive, and all SaaS apps authorized under those accounts; (4) Legitimate Figma notifications arrive only from no-reply@figma.com; Canva from team@canva.com or similar @canva.com addresses; Adobe from email.adobe.com — and they never require the recipient to re-enter Google or Microsoft account passwords to open a shared design. Warning signs: sender domain not figma.com, canva.com, or adobe.com; "view design" requires Google/Microsoft login on a non-official domain; no specific design file name, designer name, or project context visible before signing in.
False-positive guard
Every signal in Gorganizer feeds a multi-module score — never a sole verdict. This is a threat-tier signal — it adds a strong contribution to the trash score. The full pipeline still requires convergence across multiple modules + a margin over the safety floor before deletion happens, and Gmail's trash (30-day recovery) is always used — never permanent delete.
About the scoring engine
Gorganizer's scoring engine emits over 1,800 signals across six modules — headers, sender, subject, body, attachments, and structural metadata. Every email is scored by every module independently; the final verdict requires multiple modules to agree and the trash score to beat the safety floor by a margin.
Sacred safety guards — never delete starred emails, replies, calendar invites, receipts/invoices, or attachments — apply unconditionally regardless of any signal.
Ready to clean your inbox?
Gorganizer scans your Gmail with this signal and 1,800+ others, then cleans everything in one click. $4.99 one-time, no subscription.
Get started