Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Spam Campaign Targeting LinkedIn Users Called 'Largest Ever'

Fake social networking message leads users to Zeus infection

Attackers this week have been conducting a huge spam campaign targeting the users of the LinkedIn social networking service.

"This is the largest such attack known to date," said researchers from Cisco in a blog on Monday.

In the attack, victims are emailed an alert that contains a link with a fictitious social media contact request. As of Monday, these messages accounted for as much as 24 percent of all spam sent within a 15-minute interval, according to Cisco.

Clicking the link takes victims to a Web page that says, "PLEASE WAITING.... 4 SECONDS," and redirects them to Google. During those four seconds, the victim's PC is infected with the Zeus data-theft malware via a drive-by download, the Cisco researchers said. Zeus embeds itself in the victim's Web browser and captures personal information, such as online banking credentials, and is widely used by criminals to pilfer commercial bank accounts.

This is not the first time criminals have subverted brands associated with online social media, Cisco noted. The criminals controlling the Cutwail botnet routinely send email messages impersonating major social networks and governmental organizations.

"What makes this attack unique is the combination of the extremely high volume of messages transmitted, the focus on business users, and the use of the ZeuS data-theft malware," Cisco said. "This strongly suggests that the criminals behind this attack are most interested in employees with access to financial systems and online commercial bank accounts."

"The LinkedIn attacks are just a new medium for the same attackers," says Matt Jonkman, founder of Emerging Threats. "They go where the people are, whether that's Windows, Facebook, LinkedIn, or dating sites. One shift here was the size of the attack.

"Generally, a spam/phishing run will be on a smaller scale and changed often," Jonkman says. "This attack was a one-shot, large-scale run, likely because the attackers knew LinkedIn would respond quickly, so they would have just one very effective attack. The best advice to give to the end user is this: Be very skeptical of everything you get, especially if it's either unexpected or out of the ordinary for that service."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: "Elon, I think our cover's been blown."
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31607
PUBLISHED: 2021-04-23
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function...
CVE-2021-31597
PUBLISHED: 2021-04-23
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
CVE-2021-2296
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2297
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2298
PUBLISHED: 2021-04-22
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attac...