Spoofed LinkedIn emails serving client-side exploits

Spoofed LinkedIn emails serving client-side exploits

Summary: Cybercriminals are currently brand-jacking LinkedIn in an attempt to trick end users into clicking on client-side exploits serving links found in the spoofed emails.

SHARE:

Cybercriminals are currently brand-jacking LinkedIn in an attempt to trick end users into clicking on client-side exploits serving links found in the spoofed emails.

According to security researchers from GFI Labs, the spamvertised campaign is redirecting users to the Black Hole web malware exploitation kit, that is ultimately dropping a Cridex malware variant on the infected PCs.

Spamvertised subjects

  • LinkedIn Invitation from your colleague
  • LinkedIn Invitation from your co-worker
  • LinkedIn Reminder from your colleague
  • LinkedIn Notification
  • LinkedIn private message

Spamvertised message:

  • There are a total of 1 messages awaiting your response. Visit your InBox now.

End and corporate users are advised to avoid interacting with the emails, and to ensure that they are running the latest versions of their third-party software and browser plugins.

Topics: Collaboration, Social Enterprise

Dancho Danchev

About Dancho Danchev

Dancho Danchev is an independent security consultant and cyber threats analyst, with extensive experience in open source intelligence gathering, malware and cybercrime incident response.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

0 comments
Log in or register to start the discussion