Spoofed LinkedIn emails serving client-side exploits

Summary:Cybercriminals are currently brand-jacking LinkedIn in an attempt to trick end users into clicking on client-side exploits serving links found in the spoofed emails.

Cybercriminals are currently brand-jacking LinkedIn in an attempt to trick end users into clicking on client-side exploits serving links found in the spoofed emails.

According to security researchers from GFI Labs, the spamvertised campaign is redirecting users to the Black Hole web malware exploitation kit, that is ultimately dropping a Cridex malware variant on the infected PCs.

Spamvertised subjects

  • LinkedIn Invitation from your colleague
  • LinkedIn Invitation from your co-worker
  • LinkedIn Reminder from your colleague
  • LinkedIn Notification
  • LinkedIn private message

Spamvertised message:

  • There are a total of 1 messages awaiting your response. Visit your InBox now.

End and corporate users are advised to avoid interacting with the emails, and to ensure that they are running the latest versions of their third-party software and browser plugins.

Topics: Collaboration, Social Enterprise

About

Dancho Danchev is an independent security consultant and cyber threats analyst, with extensive experience in open source intelligence gathering, and cybercrime incident response. He's been an active security blogger since 2007, and maintains a popular security blog sharing real-time threats intelligence data with the rest of the community... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.