Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Spam Campaign Targeting LinkedIn Users Called 'Largest Ever'

Fake social networking message leads users to Zeus infection

Attackers this week have been conducting a huge spam campaign targeting the users of the LinkedIn social networking service.

"This is the largest such attack known to date," said researchers from Cisco in a blog on Monday.

In the attack, victims are emailed an alert that contains a link with a fictitious social media contact request. As of Monday, these messages accounted for as much as 24 percent of all spam sent within a 15-minute interval, according to Cisco.

Clicking the link takes victims to a Web page that says, "PLEASE WAITING.... 4 SECONDS," and redirects them to Google. During those four seconds, the victim's PC is infected with the Zeus data-theft malware via a drive-by download, the Cisco researchers said. Zeus embeds itself in the victim's Web browser and captures personal information, such as online banking credentials, and is widely used by criminals to pilfer commercial bank accounts.

This is not the first time criminals have subverted brands associated with online social media, Cisco noted. The criminals controlling the Cutwail botnet routinely send email messages impersonating major social networks and governmental organizations.

"What makes this attack unique is the combination of the extremely high volume of messages transmitted, the focus on business users, and the use of the ZeuS data-theft malware," Cisco said. "This strongly suggests that the criminals behind this attack are most interested in employees with access to financial systems and online commercial bank accounts."

"The LinkedIn attacks are just a new medium for the same attackers," says Matt Jonkman, founder of Emerging Threats. "They go where the people are, whether that's Windows, Facebook, LinkedIn, or dating sites. One shift here was the size of the attack.

"Generally, a spam/phishing run will be on a smaller scale and changed often," Jonkman says. "This attack was a one-shot, large-scale run, likely because the attackers knew LinkedIn would respond quickly, so they would have just one very effective attack. The best advice to give to the end user is this: Be very skeptical of everything you get, especially if it's either unexpected or out of the ordinary for that service."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...
CVE-2021-1071
PUBLISHED: 2021-01-26
NVIDIA Tegra kernel in Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, all L4T versions prior to r32.5, contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to...
CVE-2020-23774
PUBLISHED: 2021-01-26
A reflected XSS vulnerability exists in tohtml/convert.php of Winmail 6.5, which can cause JavaScript code to be executed.
CVE-2020-23776
PUBLISHED: 2021-01-26
A SSRF vulnerability exists in Winmail 6.5 in app.php in the key parameter when HTTPS is on. An attacker can use this vulnerability to cause the server to send a request to a specific URL. An attacker can modify the request header 'HOST' value to cause the server to send the request.
CVE-2021-3309
PUBLISHED: 2021-01-26
packages/wekan-ldap/server/ldap.js in Wekan before 4.87 can process connections even though they are not authorized by the Certification Authority trust store,