Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

10/30/2009
05:04 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

LinkedIN With 'Bill Gates'

Bill Gates invited me to join his LinkedIN network. OK, so it wasn't really Bill Gates, but as far as my email system, spam filter, and email client were concerned, it's perfectly normal for Gates to send me a LinkedIn invitation.

Bill Gates invited me to join his LinkedIN network. OK, so it wasn't really Bill Gates, but as far as my email system, spam filter, and email client were concerned, it's perfectly normal for Gates to send me a LinkedIn invitation.Notice that I said he invited me to join his LinkedIN network: If you're a LinkedIn member, then the uppercase "N" should be your first clue the message was phony. That misspelling was in the subject line of the email, though the message's contents spelled it correctly. But apparently many email security products don't notice those things, as researcher Joshua Perrymon demonstrated in his recent spear-phishing experiment, which was 100 percent successful across multiple email products and services, including iPhones, BlackBerrys, and Palm Pres.

I was one of Josh's guinea pigs for his experiment, so I got to see how easy phishing email can bypass email security controls. There obviously wasn't much chance I would get duped by the invite: I knew that my interviewing Bill Gates on the spot at a computer conference when I was in my 20s wasn't enough to get me into his social networking inner circle. But what if Perrymon's rather convincing spoofed LinkedIn invite had come from someone I did know, and had spelled LinkedIn with a lowercase "n"?

I would easily have fallen for it.

Now that's social engineering at its best, right? You bet. There's no patch for a good social engineering attack. But what worries me is that while Perrymon's message had the look and feel of a legit LinkedIn invitation message, it still had the capitalization issue and Bill Gates' name in it -- a couple of things you'd think might appear spammy to a filter. But then again, Russian-language email messages occasionally slip through and land in my inbox, too. So I guess I'm not surprised that the experiment worked on my end.

Still, it was a good exercise to experience firsthand, especially when Perrymon showed me the results of the data he was able to gather about me when I willingly clicked on the link in the email -- my operating system, browser version, IP address, etc. Nope, nothing Bill Gates would be interested in.

-- Kelly Jackson Higgins, Senior Editor, Dark Reading Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14191
PUBLISHED: 2020-11-25
Affected versions of Atlassian Fisheye/Crucible allow remote attackers to impact the application's availability via a Denial of Service (DoS) vulnerability in the MessageBundleResource within Atlassian Gadgets. The affected versions are before version 4.8.4.
CVE-2020-29070
PUBLISHED: 2020-11-25
osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the XSS payload into the title section of newsletters.
CVE-2020-26212
PUBLISHED: 2020-11-25
GLPI stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In GLPI before version 9.5.3, any authenticated user has read-only permissions to the planning of ever...
CVE-2020-26243
PUBLISHED: 2020-11-25
Nanopb is a small code-size Protocol Buffers implementation. In Nanopb before versions 0.4.4 and 0.3.9.7, decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded...
CVE-2020-25650
PUBLISHED: 2020-11-25
A flaw was found in the way the spice-vdagentd daemon handled file transfers from the host system to the virtual machine. Any unprivileged local guest user with access to the UNIX domain socket path `/run/spice-vdagentd/spice-vdagent-sock` could use this flaw to perform a memory denial of service fo...