May 21, 2021 By David Bisson 2 min read

LinkedIn security problems may come not from the website itself but from people trying to abuse it. Digital attackers launched a spear-phishing campaign on LinkedIn in April that used fake job offers to spread malware.

The attackers attempted to trick professionals into opening a .ZIP file that used the same job position as the one listed on their LinkedIn profiles. That .ZIP file could then download more_eggs, a backdoor. It’s capable of running numerous malicious plugins, as well as enabling remote access to a victim’s computer.

Read on to learn how attackers are using threats like more_eggs malware to go after people on LinkedIn.

More_eggs, More Problems

Researchers at eSentire disrupted the LinkedIn security spear-phishing incident. In this case, the attackers had targeted someone in the health care sector.

Upon opening the .ZIP file referenced above, the campaign ran VenomLNK as an initial stage of the more_eggs backdoor. This resource misused Windows Management Instrumentation in a fileless attack chain. From there, TerraLoader, the backdoor’s plugin loader, could hijack legitimate Windows processes and present the victim with a fake Word document.

The file masqueraded as a legitimate job application in an attempt to distract the victim from more_eggs working in the background.

TerraLoader then loaded TerraPreter, a payload that established contact with the campaign’s command-and-control server. This line of communication enabled the attackers to use more_eggs to install additional malware such as ransomware. From there, they could establish a foothold in the victim’s network and use it to begin exfiltrating sensitive information.

Other Fake Job Scams and LinkedIn Phishing Attacks

Proofpoint spotted a similar attack in 2019. In that offensive, attackers misused LinkedIn’s direct messaging service to establish a rapport with their victims. They then sent follow-up emails where they pretended to be a staffing company with an employment offer. Those emails directed recipients to visit a fake website or open a malicious attachment. Either option infected the victim with more_eggs.

In January 2021, malicious actors used LinkedIn contact requests to install the ZeuS data theft malware onto victims’ computers. Others used similar scam messages to trick LinkedIn users into sharing their banking information.

Some attackers used phishing messages to trick recipients into opening a ‘LinkedIn Private Shared Document’. As reported by Tom’s Guide, that asset redirected the user to a fake login page designed to steal the visitor’s account credentials.

How to Defend Against Fake Job Offer Scams on LinkedIn

As with other spear-phishing attacks, LinkedIn scammers may reference specific people or jobs to try to look more real. One of the ways employers can defend against this is to educate their employees about some of the most common types of phishing attacks in use today. When paired with threat intelligence, that training can help to protect against new attack campaigns targeting LinkedIn and other platforms.

Organizations can also use security awareness training to help prevent their employees from sharing too much on social media. This will help to prevent attackers from using LinkedIn to scout out potential targets for the purpose of launching follow-up attacks.

More from News

CISA warns about credential access in FY23 risk & vulnerability assessment

3 min read - CISA released its Fiscal Year 2023 (FY23) Risk and Vulnerability Assessments (RVA) Analysis, providing a crucial look into the tactics and techniques threat actors employed to compromise critical infrastructure. The report is part of the agency’s ongoing effort to improve national cybersecurity through assessments of vulnerabilities in key sectors. Meanwhile, IBM’s X-Force Threat Intelligence Index 2024 has identified credential access as one of the most significant risks to organizations. Both reports shed light on the persistent and growing threat of…

CISA launches portal to simplify cyber incident reporting

2 min read - Information sharing just got more efficient. In August, the Cybersecurity and Infrastructure Security Agency (CISA) launched the CISA Services Portal. “The new CISA Services Portal improves the reporting process and offers more features for our voluntary reporters. We ask organizations reporting an incident to provide information on the impacted entity, contact information, description of the incident, technical indications and steps taken,” a CISA spokesperson said in an email statement. “Reported incidents enable CISA and our partners to help victims mitigate…

FYSA – Critical RCE Flaw in GNU-Linux Systems

2 min read - Summary The first of a series of blog posts has been published detailing a vulnerability in the Common Unix Printing System (CUPS), which purportedly allows attackers to gain remote access to UNIX-based systems. The vulnerability, which affects various UNIX-based operating systems, can be exploited by sending a specially crafted HTTP request to the CUPS service. Threat Topography Threat Type: Remote code execution vulnerability in CUPS service Industries Impacted: UNIX-based systems across various industries, including but not limited to, finance, healthcare,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today