May 21, 2021 By David Bisson 2 min read

LinkedIn security problems may come not from the website itself but from people trying to abuse it. Digital attackers launched a spear-phishing campaign on LinkedIn in April that used fake job offers to spread malware.

The attackers attempted to trick professionals into opening a .ZIP file that used the same job position as the one listed on their LinkedIn profiles. That .ZIP file could then download more_eggs, a backdoor. It’s capable of running numerous malicious plugins, as well as enabling remote access to a victim’s computer.

Read on to learn how attackers are using threats like more_eggs malware to go after people on LinkedIn.

More_eggs, More Problems

Researchers at eSentire disrupted the LinkedIn security spear-phishing incident. In this case, the attackers had targeted someone in the health care sector.

Upon opening the .ZIP file referenced above, the campaign ran VenomLNK as an initial stage of the more_eggs backdoor. This resource misused Windows Management Instrumentation in a fileless attack chain. From there, TerraLoader, the backdoor’s plugin loader, could hijack legitimate Windows processes and present the victim with a fake Word document.

The file masqueraded as a legitimate job application in an attempt to distract the victim from more_eggs working in the background.

TerraLoader then loaded TerraPreter, a payload that established contact with the campaign’s command-and-control server. This line of communication enabled the attackers to use more_eggs to install additional malware such as ransomware. From there, they could establish a foothold in the victim’s network and use it to begin exfiltrating sensitive information.

Other Fake Job Scams and LinkedIn Phishing Attacks

Proofpoint spotted a similar attack in 2019. In that offensive, attackers misused LinkedIn’s direct messaging service to establish a rapport with their victims. They then sent follow-up emails where they pretended to be a staffing company with an employment offer. Those emails directed recipients to visit a fake website or open a malicious attachment. Either option infected the victim with more_eggs.

In January 2021, malicious actors used LinkedIn contact requests to install the ZeuS data theft malware onto victims’ computers. Others used similar scam messages to trick LinkedIn users into sharing their banking information.

Some attackers used phishing messages to trick recipients into opening a ‘LinkedIn Private Shared Document’. As reported by Tom’s Guide, that asset redirected the user to a fake login page designed to steal the visitor’s account credentials.

How to Defend Against Fake Job Offer Scams on LinkedIn

As with other spear-phishing attacks, LinkedIn scammers may reference specific people or jobs to try to look more real. One of the ways employers can defend against this is to educate their employees about some of the most common types of phishing attacks in use today. When paired with threat intelligence, that training can help to protect against new attack campaigns targeting LinkedIn and other platforms.

Organizations can also use security awareness training to help prevent their employees from sharing too much on social media. This will help to prevent attackers from using LinkedIn to scout out potential targets for the purpose of launching follow-up attacks.

More from News

Research finds 56% increase in active ransomware groups

4 min read - Any good news is welcomed when evaluating cyber crime trends year-over-year. Over the last two years, IBM’s Threat Index Reports have provided some minor reprieve in this area by showing a gradual decline in the prevalence of ransomware attacks — now accounting for only 17% of all cybersecurity incidents compared to 21% in 2021. Unfortunately, it’s too early to know if this trendline will continue. A recent report released by Searchlight Cyber shows that there has been a 56% increase in…

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

CISA and FBI release secure by design alert on cross-site scripting 

3 min read - CISA and the FBI are increasingly focusing on proactive cybersecurity and cyber resilience measures. Conjointly, the agencies recently released a new Secure by Design alert aimed at eliminating cross-site Scripting (XSS) vulnerabilities, which have long been exploited to compromise both data and user trust. Cross-site scripting vulnerabilities occur when a web application improperly handles user input, allowing attackers to inject malicious scripts into web pages that are then executed by unsuspecting users. These vulnerabilities are dangerous because they don't attack…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today