Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:04 PM
Connect Directly

LinkedIN With 'Bill Gates'

Bill Gates invited me to join his LinkedIN network. OK, so it wasn't really Bill Gates, but as far as my email system, spam filter, and email client were concerned, it's perfectly normal for Gates to send me a LinkedIn invitation.

Bill Gates invited me to join his LinkedIN network. OK, so it wasn't really Bill Gates, but as far as my email system, spam filter, and email client were concerned, it's perfectly normal for Gates to send me a LinkedIn invitation.Notice that I said he invited me to join his LinkedIN network: If you're a LinkedIn member, then the uppercase "N" should be your first clue the message was phony. That misspelling was in the subject line of the email, though the message's contents spelled it correctly. But apparently many email security products don't notice those things, as researcher Joshua Perrymon demonstrated in his recent spear-phishing experiment, which was 100 percent successful across multiple email products and services, including iPhones, BlackBerrys, and Palm Pres.

I was one of Josh's guinea pigs for his experiment, so I got to see how easy phishing email can bypass email security controls. There obviously wasn't much chance I would get duped by the invite: I knew that my interviewing Bill Gates on the spot at a computer conference when I was in my 20s wasn't enough to get me into his social networking inner circle. But what if Perrymon's rather convincing spoofed LinkedIn invite had come from someone I did know, and had spelled LinkedIn with a lowercase "n"?

I would easily have fallen for it.

Now that's social engineering at its best, right? You bet. There's no patch for a good social engineering attack. But what worries me is that while Perrymon's message had the look and feel of a legit LinkedIn invitation message, it still had the capitalization issue and Bill Gates' name in it -- a couple of things you'd think might appear spammy to a filter. But then again, Russian-language email messages occasionally slip through and land in my inbox, too. So I guess I'm not surprised that the experiment worked on my end.

Still, it was a good exercise to experience firsthand, especially when Perrymon showed me the results of the data he was able to gather about me when I willingly clicked on the link in the email -- my operating system, browser version, IP address, etc. Nope, nothing Bill Gates would be interested in.

-- Kelly Jackson Higgins, Senior Editor, Dark Reading Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We are really excited about our new two tone authentication system!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-12-01
Privilege Escalation vulnerability in Microsoft Windows client McAfee Total Protection (MTP) prior to 16.0.29 allows local users to gain elevated privileges via careful manipulation of a folder by creating a junction link. This exploits a lack of protection through a timing issue and is only exploit...
PUBLISHED: 2020-12-01
containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to host network containers. Access controls for the shim’s API socket verified that...
PUBLISHED: 2020-12-01
FusionCompute versions 6.3.0, 6.3.1, 6.5.0, 6.5.1 and 8.0.0 have a privilege escalation vulnerability. Due to improper privilege management, an attacker with common privilege may access some specific files and get the administrator privilege in the affected products. Successful exploit will cause pr...
PUBLISHED: 2020-12-01
HUAWEI nova 4 versions earlier than and SydneyM-AL00 versions earlier than have an out-of-bounds read and write vulnerability. An attacker with specific permissions crafts malformed packet with specific parameter and sends the packet to the affected prod...
PUBLISHED: 2020-12-01
HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.