LinkedIn security problems may come not from the website itself but from people trying to abuse it. Digital attackers launched a spear-phishing campaign on LinkedIn in April that used fake job offers to spread malware.

The attackers attempted to trick professionals into opening a .ZIP file that used the same job position as the one listed on their LinkedIn profiles. That .ZIP file could then download more_eggs, a backdoor. It’s capable of running numerous malicious plugins, as well as enabling remote access to a victim’s computer.

Read on to learn how attackers are using threats like more_eggs malware to go after people on LinkedIn.

More_eggs, More Problems

Researchers at eSentire disrupted the LinkedIn security spear-phishing incident. In this case, the attackers had targeted someone in the health care sector.

Upon opening the .ZIP file referenced above, the campaign ran VenomLNK as an initial stage of the more_eggs backdoor. This resource misused Windows Management Instrumentation in a fileless attack chain. From there, TerraLoader, the backdoor’s plugin loader, could hijack legitimate Windows processes and present the victim with a fake Word document.

The file masqueraded as a legitimate job application in an attempt to distract the victim from more_eggs working in the background.

TerraLoader then loaded TerraPreter, a payload that established contact with the campaign’s command-and-control server. This line of communication enabled the attackers to use more_eggs to install additional malware such as ransomware. From there, they could establish a foothold in the victim’s network and use it to begin exfiltrating sensitive information.

Other Fake Job Scams and LinkedIn Phishing Attacks

Proofpoint spotted a similar attack in 2019. In that offensive, attackers misused LinkedIn’s direct messaging service to establish a rapport with their victims. They then sent follow-up emails where they pretended to be a staffing company with an employment offer. Those emails directed recipients to visit a fake website or open a malicious attachment. Either option infected the victim with more_eggs.

In January 2021, malicious actors used LinkedIn contact requests to install the ZeuS data theft malware onto victims’ computers. Others used similar scam messages to trick LinkedIn users into sharing their banking information.

Some attackers used phishing messages to trick recipients into opening a ‘LinkedIn Private Shared Document’. As reported by Tom’s Guide, that asset redirected the user to a fake login page designed to steal the visitor’s account credentials.

How to Defend Against Fake Job Offer Scams on LinkedIn

As with other spear-phishing attacks, LinkedIn scammers may reference specific people or jobs to try to look more real. One of the ways employers can defend against this is to educate their employees about some of the most common types of phishing attacks in use today. When paired with threat intelligence, that training can help to protect against new attack campaigns targeting LinkedIn and other platforms.

Organizations can also use security awareness training to help prevent their employees from sharing too much on social media. This will help to prevent attackers from using LinkedIn to scout out potential targets for the purpose of launching follow-up attacks.

More from News

Securing critical infrastructure with the carrot and stick

4 min read - It wasn’t long ago that cybersecurity was a fringe topic of interest. Now, headline-making breaches impact large numbers of everyday citizens. Entire cities find themselves under cyberattack. In a short time, cyber has taken an important place in the national discourse. Today, governments, regulatory agencies and companies must work together to confront this growing threat. So how is the federal government bolstering security for critical infrastructure? It looks like they are using a carrot-and-stick approach. Back in March 2022, the…

650,000 cyber jobs are now vacant: How to tackle the risk

4 min read - How far is the United States behind in filing cybersecurity jobs? As per Rep. Andrew Garbarino, R-N.Y., Chairman of the HHS Cybersecurity and Infrastructure Protection Subcommittee, overseas adversaries have a workforce advantage over FBI cyber personnel of 50 to one. His statements were made during a recent subcommittee hearing titled “Growing the National Cybersecurity Talent Pipeline.” Meanwhile, recent CyberSeek data shows over 650,000 cyber jobs to fill nationwide. Given the rising rate of cyberattacks, these numbers are truly alarming. How…

Will data backups save you from ransomware? Think again

4 min read - Backups are an essential part of any solid anti-ransomware strategy. In fact, research shows that the median recovery cost for ransomware victims that used backups is half the cost incurred by those that paid the ransom. But not all data backup approaches are created equal. A separate report found that in 93% of ransomware incidents, threat actors actively target backup repositories. This results in 75% of victims losing at least some of their backups during the attack, and more than…

Should you worry about state-sponsored attacks? Maybe not.

4 min read - More than ever, state-sponsored cyber threats worry security professionals. In fact, nation-state activity alerts increased against critical infrastructure from 20% to 40% from 2021 to 2022, according to a recent Microsoft Digital Defense Report. With the advent of the hybrid war in Ukraine, nation-state actors are launching increasingly sophisticated attacks. But is this the most prominent danger facing companies today? While nation-state-based attacks cannot be ignored, it looks like insider cyber incidents are far more common. In fact, for the…