LinkedIn security problems may come not from the website itself but from people trying to abuse it. Digital attackers launched a spear-phishing campaign on LinkedIn in April that used fake job offers to spread malware.

The attackers attempted to trick professionals into opening a .ZIP file that used the same job position as the one listed on their LinkedIn profiles. That .ZIP file could then download more_eggs, a backdoor. It’s capable of running numerous malicious plugins, as well as enabling remote access to a victim’s computer.

Read on to learn how attackers are using threats like more_eggs malware to go after people on LinkedIn.

More_eggs, More Problems

Researchers at eSentire disrupted the LinkedIn security spear-phishing incident. In this case, the attackers had targeted someone in the health care sector.

Upon opening the .ZIP file referenced above, the campaign ran VenomLNK as an initial stage of the more_eggs backdoor. This resource misused Windows Management Instrumentation in a fileless attack chain. From there, TerraLoader, the backdoor’s plugin loader, could hijack legitimate Windows processes and present the victim with a fake Word document.

The file masqueraded as a legitimate job application in an attempt to distract the victim from more_eggs working in the background.

TerraLoader then loaded TerraPreter, a payload that established contact with the campaign’s command-and-control server. This line of communication enabled the attackers to use more_eggs to install additional malware such as ransomware. From there, they could establish a foothold in the victim’s network and use it to begin exfiltrating sensitive information.

Other Fake Job Scams and LinkedIn Phishing Attacks

Proofpoint spotted a similar attack in 2019. In that offensive, attackers misused LinkedIn’s direct messaging service to establish a rapport with their victims. They then sent follow-up emails where they pretended to be a staffing company with an employment offer. Those emails directed recipients to visit a fake website or open a malicious attachment. Either option infected the victim with more_eggs.

In January 2021, malicious actors used LinkedIn contact requests to install the ZeuS data theft malware onto victims’ computers. Others used similar scam messages to trick LinkedIn users into sharing their banking information.

Some attackers used phishing messages to trick recipients into opening a ‘LinkedIn Private Shared Document’. As reported by Tom’s Guide, that asset redirected the user to a fake login page designed to steal the visitor’s account credentials.

How to Defend Against Fake Job Offer Scams on LinkedIn

As with other spear-phishing attacks, LinkedIn scammers may reference specific people or jobs to try to look more real. One of the ways employers can defend against this is to educate their employees about some of the most common types of phishing attacks in use today. When paired with threat intelligence, that training can help to protect against new attack campaigns targeting LinkedIn and other platforms.

Organizations can also use security awareness training to help prevent their employees from sharing too much on social media. This will help to prevent attackers from using LinkedIn to scout out potential targets for the purpose of launching follow-up attacks.

more from News

Ransomware Attacks on Agriculture Potentially Timed to Critical Seasons

The FBI has warned the Food and Agriculture (FA) sector that ransomware actors may be preparing to attack agricultural cooperatives during critical planting and harvest seasons. This could lead to disrupted operations, financial loss and a negative impact on the food supply chain. The FBI Private Industry Notification states that since 2021, ransomware variants have impacted multiple agricultural cooperatives. Initial…