{"id":22832,"date":"2023-09-01T16:10:06","date_gmt":"2023-09-02T00:10:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/09\/01\/news-16562\/"},"modified":"2023-09-01T16:10:06","modified_gmt":"2023-09-02T00:10:06","slug":"news-16562","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/09\/01\/news-16562\/","title":{"rendered":"A firsthand perspective on the recent LinkedIn account takeover campaign"},"content":{"rendered":"<p>Not long ago I wrote about a recent campaign to <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/08\/linkedin-account-take-over-campaign-leads-to-frustrated-victims\">hold LinkedIn users&#8217; accounts to ransom<\/a>. Shortly after I published the article, a co-worker, Peace, reached out to me told me they&#8217;d been a target of the campaign.<\/p>\n<p>His story begins with an SMS text from LinkedIn telling him to reset his password. He found this confusing: It arrived in the middle of the night, and he hadn&#8217;t asked for a password reset. Since he doesn&rsquo;t use the LinkedIn app on his mobile he checked his account on his laptop first thing in the morning. The current sessions (Profile Picture &gt; Settings &gt; Sign in &amp; security &gt; Where you&rsquo;re signed in) showed an unknown IP address in Texas logged into his account.<\/p>\n<p>Frustration #1: The <a href=\"https:\/\/www.linkedin.com\/help\/linkedin\/answer\/a1342354\" target=\"_blank\" rel=\"nofollow\">promised<\/a> &ldquo;Sign out of all these sessions&rdquo; option is nowhere to be found. I double checked in a browser session on Windows and in the app on Android. It&rsquo;s not there.<\/p>\n<p>Pearce then found out that there was at least one person in his Connections that he did not invite or accept an invitation from. This person also hails from Texas.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/09\/easset_upload_file13637_280604_e.png\" alt=\"screenshot of the location of the new connection\" width=\"307\" height=\"111\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>Pearce is a security professional so as soon as he was convinced there was someone else with access to his LinkedIn account, he took action.<\/p>\n<p>A reset of the account&rsquo;s password worked, but failed to remove the unwanted active session.<\/p>\n<p>Pearce had already set up multi-factor authentication (MFA) on his account, but changed this from SMS to an authenticator app. As I stated in my previous blog, &ldquo;Setting up MFA for LinkedIn with Okta turned out to be painful because LinkedIn does not provide a QR code but a secret key which is so long that it&rsquo;s hard to get it right the first, or second time.&rdquo;<\/p>\n<p>But despite his troubles this didn&rsquo;t remove the unwanted active session either.<\/p>\n<p>Frustration #2: Changing security and sign in settings is a pain, but has no effect on currently logged in users on other devices.<\/p>\n<p>Frustration #3: LinkedIn Support is overwhelmed and takes quite some time before you get actual help.<\/p>\n<p>Pearce opened a support ticket with LinkedIn. As we mentioned before, the campaign appears to have completely overwhelmed LinkedIn Support. The LinkedIn Help account on X (formerly Twitter) has pinned a message to say:<\/p>\n<blockquote><p>&ldquo;Hey there! \ud83d\udc4b We&#8217;re experiencing an uptick in questions from our members, causing longer reply times. Rest assured, we&#8217;re doing our best to assist you! For account-specific inquiries, please DM us the details and your email address. We appreciate your patience. Thanks! \ud83d\ude4c&rdquo;<\/p><\/blockquote>\n<p>It took them 3 to 4 days to reply with the following message:<\/p>\n<blockquote>\n<p>Status: Closed<\/p>\n<p>&#8230;<\/p>\n<p>Hi Pearce,<\/p>\n<p>Thanks for contacting us about this. To secure your account, we&#8217;ve taken the following actions:<\/p>\n<ol>\n<li>We signed you out of your account from every computer or mobile device it has been accessed on. Note: This will now prompt a new login for your account.<\/li>\n<li>We sent a password reset link to the primary email address listed on your account.<\/li>\n<\/ol>\n<p>There are a few scenarios that could explain the possibility of unauthorized access to a LinkedIn account:<\/p>\n<ul>\n<li>If you&#8217;ve recently signed into your account from a public computer or a shared device at your workplace or home, and didn&#8217;t completely sign out of your account, the next person to access the site on that device may have unintentionally signed in to your account.<\/li>\n<li>An email or phone number registered in your account is outdated and access to the email or phone number has been recycled or compromised.<\/li>\n<li>If the same password is used in multiple websites, this could have been compromised through unaffiliated sites or a phishing attack.<\/li>\n<li>We&#8217;d recommend these best practices for your online privacy:<\/li>\n<ul>\n<li>Check the email addresses on your account to ensure they are current: <a href=\"https:\/\/www.linkedin.com\/help\/linkedin\/answer\/60\">https:\/\/www.linkedin.com\/help\/linkedin\/answer\/60<\/a><\/li>\n<li>Turn on two-step verification as an added layer of security: <a href=\"https:\/\/www.linkedin.com\/help\/linkedin\/answer\/544\">https:\/\/www.linkedin.com\/help\/linkedin\/answer\/544<\/a><\/li>\n<li>Find more tips here: <a href=\"https:\/\/www.linkedin.com\/help\/linkedin\/answer\/267\">https:\/\/www.linkedin.com\/help\/linkedin\/answer\/267<\/a><\/li>\n<\/ul>\n<\/ul>\n<p>If you continue to see anything suspicious, please report it to us immediately.<\/p>\n<p>Regards,<\/p>\n<p>LinkedIn Member Safety and Recovery Consultant<\/p>\n<\/blockquote>\n<p>Fortunately this worked and Pearce has regained control of his account. But this ordeal could have been much worse than with just a few added new connections. Had the account been taken over, it could have been used for malicious activities, damaging Pearce&rsquo;s reputation in the process.<\/p>\n<p>Note: LinkedIn has added an option to end individual sessions since this incident, but a few quick tests showed that this doesn&rsquo;t always work as advertised. We may dive into that at a later point.<\/p>\n<hr \/>\n<p dir=\"ltr\">Malwarebytes EDR and MDR removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\" class=\"blue-cta-bttn\">TRY NOW<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/09\/first-hand-experience-with-a-linkedin-account-takeover-attempt\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: LinkedIn<\/p>\n<p>Tags:  sessions<\/p>\n<p>Tags:  contacts<\/p>\n<p>It started with a password reset email in the middle of the night.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/09\/first-hand-experience-with-a-linkedin-account-takeover-attempt\" title=\"A firsthand perspective on the recent LinkedIn account takeover campaign\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/09\/first-hand-experience-with-a-linkedin-account-takeover-attempt\">A firsthand perspective on the recent LinkedIn account takeover campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[26162,11448,32,30060],"class_list":["post-22832","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-contacts","tag-linkedin","tag-news","tag-sessions"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22832"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22832\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22832"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}