theDocumentId => 1134458 Spam Campaign Targeting LinkedIn Users Called ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Spam Campaign Targeting LinkedIn Users Called 'Largest Ever'

Fake social networking message leads users to Zeus infection

Attackers this week have been conducting a huge spam campaign targeting the users of the LinkedIn social networking service.

"This is the largest such attack known to date," said researchers from Cisco in a blog on Monday.

In the attack, victims are emailed an alert that contains a link with a fictitious social media contact request. As of Monday, these messages accounted for as much as 24 percent of all spam sent within a 15-minute interval, according to Cisco.

Clicking the link takes victims to a Web page that says, "PLEASE WAITING.... 4 SECONDS," and redirects them to Google. During those four seconds, the victim's PC is infected with the Zeus data-theft malware via a drive-by download, the Cisco researchers said. Zeus embeds itself in the victim's Web browser and captures personal information, such as online banking credentials, and is widely used by criminals to pilfer commercial bank accounts.

This is not the first time criminals have subverted brands associated with online social media, Cisco noted. The criminals controlling the Cutwail botnet routinely send email messages impersonating major social networks and governmental organizations.

"What makes this attack unique is the combination of the extremely high volume of messages transmitted, the focus on business users, and the use of the ZeuS data-theft malware," Cisco said. "This strongly suggests that the criminals behind this attack are most interested in employees with access to financial systems and online commercial bank accounts."

"The LinkedIn attacks are just a new medium for the same attackers," says Matt Jonkman, founder of Emerging Threats. "They go where the people are, whether that's Windows, Facebook, LinkedIn, or dating sites. One shift here was the size of the attack.

"Generally, a spam/phishing run will be on a smaller scale and changed often," Jonkman says. "This attack was a one-shot, large-scale run, likely because the attackers knew LinkedIn would respond quickly, so they would have just one very effective attack. The best advice to give to the end user is this: Be very skeptical of everything you get, especially if it's either unexpected or out of the ordinary for that service."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-37578
PUBLISHED: 2021-07-29
Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malic...
CVE-2021-23416
PUBLISHED: 2021-07-28
This affects all versions of package curly-bracket-parser. When used as a template library, it does not properly sanitize the user input.
CVE-2021-23417
PUBLISHED: 2021-07-28
All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function.
CVE-2021-23415
PUBLISHED: 2021-07-28
This affects the package elFinder.AspNet before 1.1.1. The user-controlled file name is not properly sanitized before it is used to create a file system path.
CVE-2020-4974
PUBLISHED: 2021-07-28
IBM Jazz Foundation products are vulnerable to server side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 192434.