Cybersecurity experts report the detection of a severe problem on LinkedIn that would allow threat actors to distribute the “more_egg” malware on this networking platform. This is a practice known as spear phishing and relates to a much more specific approach in particular users.
In the attack, LinkedIn users might find a link to attractive job offers, which is common on this platform. Reports ensure that multiple malware infections have been detected from interaction with malicious links.
Kaspersky researchers point out that spear phishing is a highly selective attack method, allowing threat actors to select a very specific group of potential victims. While these attacks are usually carried through emails, experts point out that it is entirely feasible for attacks to be deployed on such platforms.
A report recently published by eSentire experts mentions that hackers have focused their efforts on LinkedIn because of the need thousands of people to find attractive jobs. Researchers believe hackers are looking for sensitive user information, including full names, phone numbers and bank details, among others.
The report also notes that after clicking on the link, a normal process starts running on the Windows operating system, making antivirus detection really difficult. Most alarmingly, this attack variant could effectively spread among LinkedIn users, although its current scope could not be determined; finally, experts mentioned that an attack could remain persistent for an indeterminate time due to difficulty detecting malicious activity on the target system.
Hackers are also employing an additional malware variant known as “Golden Chicken” to perform subsequent attacks. This malware goes far beyond the theft of administrator credentials, as experts believe it could allow remote manipulation of compromised systems. The finding of these dangerous malware variants has taken by surprise those responsible for LinkedIn, who recommend users ignore any messages sent by unknown users, as well as be wary of unsolicited job offers or that they may seem too good to be true.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.