Fake LinkedIn profile gathering info for targeted attacks
Posted on 04 November 2013.
Social networks are great sources of information for cyber criminals and a great way to enter the potential victims’ circle of trust.

An ongoing social engineering campaign targeting LinkedIn users has been using the “professional” social network to popularise a specific dating site but, according to Websense researchers, the final aim of the campaign is likely more sinister.

The attackers have created a fake LinkedIn account under the name Jessica Reinsch, which currently has over 400 connections, and is used both to view the profiles of potential targets and to lead them to the aforementioned dating site (“For younger ladies and mature gentlemen”):


“Search features within the social network provide an easy way for scammers and legitimate LinkedIn users to zoom in on their target audience,” the researchers point out. “Whether you are a recruiter looking for potential candidates, a dating scammer looking for "mature gentlemen", or an advanced attacker looking for high-profile directors within particular industry sectors, LinkedIn users have access to tools to help refine their search.”

In order to do this more effectively, the scammers made sure to make the account in question a Premium Account, which allows them to search for users based on their job function, seniority level and company size - all information that can come in handy for future social engineering attacks.

“Note that features of the Premium Account also facilitate a greater degree of interaction with targets. Should a target view the scam profile, the scammer can then see that, for all views. The scammer could also contact any LinkedIn member and search across a greater number of profiles,” the researchers add.

The researchers believe that the scammers are using the dating site as a lure. They pointed out that the site does not currently sport any malicious code, but that its IP address has been previously linked to domains that did, as well as to a Autonomous System Number (ASN) that, at one time, included C&C URLs for a number of exploit kits.

All this seems to indicate that the campaign is far from innocuous, and that this is probably just the malicious scheme’s “reconnaissance” phase. Just in case, the researchers have reported the profile to LinkedIn.









Spotlight

Patching: The least understood line of defense

Posted on 29 August 2014.  |  How many end users, indeed how many IT pros, truly get patching? Sure, many of us see Windows install updates when we shut down our PC and think all is well. It’s not.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 2nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //