{"id":9244,"date":"2017-09-12T10:10:22","date_gmt":"2017-09-12T18:10:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/12\/news-3017\/"},"modified":"2017-09-12T10:10:22","modified_gmt":"2017-09-12T18:10:22","slug":"news-3017","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/12\/news-3017\/","title":{"rendered":"Compromised LinkedIn accounts used to send phishing links via private message and InMail"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 12 Sep 2017 17:24:39 +0000<\/strong><\/p>\n<p>Phishing continues to be a criminals&#8217; favorite for harvesting user credentials with more or less sophisticated social engineering tricks. In this post, we take a look at a recent attack that uses existing LinkedIn user accounts to send phishing links to their contacts via private message but also to external members via email.<\/p>\n<p>What makes this campaign interesting is the abuse of long standing and trusted accounts that were hacked, including Premium membership accounts that have the ability to contact other LinkedIn users (even if they aren&#8217;t a direct contact) via the InMail feature. The fraudulent message includes a reference to a shared document and a link that redirects to a phishing site for Gmail and other email providers which require potential victims to log in.<\/p>\n<p>Those who proceed will have their username, password, and phone number stolen but won&#8217;t realize they were duped right away. Indeed, this phishing scam ends on a tricky note with a decoy document on wealth management from Wells Fargo.<\/p>\n<h3>Private message<\/h3>\n<p>This message was received from a trusted and existing contact, although the time stamp is showing 12:17 AM, which is perhaps one of the red flags to be noted. The message talks about a shared Google Doc and gives a link to it, via the Ow.ly URL shortener.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/message.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19643 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/message.png\" alt=\"\" width=\"323\" height=\"646\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/message.png 360w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/message-150x300.png 150w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/message-300x600.png 300w\" sizes=\"auto, (max-width: 323px) 100vw, 323px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 1: An instant message from a contact directing to a phishing scam<\/em><\/p>\n<h3>Behind the shortened URL redirection<\/h3>\n<p>URL shorteners are a well-known vehicle for spreading malware and phishing scams but they are also used for legitimate purposes, especially on social media where long URLs tend to be too cumbersome. In this attack, the perpetrators are abusing both <em>ow.ly<\/em> and a free hosting provider (<em>gdk.mx<\/em>) to redirect to the phishing page, itself hosted on a hacked website.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/traffic.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19646 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/traffic.png\" alt=\"\" width=\"864\" height=\"627\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/traffic.png 864w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/traffic-300x218.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/traffic-600x435.png 600w\" sizes=\"auto, (max-width: 864px) 100vw, 864px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 2: The redirection flow behind this phish<\/em><\/p>\n<h3>Phishing for email credentials<\/h3>\n<p>This particular page is built as a Gmail phish, but will also ask for Yahoo or AOL user names and passwords. The main page is followed by an additional request for a phone number or secondary email address and ultimately the user sees a decoy Wells Fargo document hosted on Google Docs.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/phish.gif\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19647 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/phish.gif\" alt=\"\" width=\"843\" height=\"803\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 3: The phishing template, harvesting credentials and showing decoy content<\/em><\/p>\n<h3>InMail<\/h3>\n<p>Attackers are also abusing LinkedIn&#8217;s trusted <a href=\"https:\/\/www.linkedin.com\/help\/linkedin\/answer\/1584\/inmail-overview?lang=en\" target=\"_blank\" rel=\"noopener\">InMail<\/a> feature to send the same phishing link. As per LinkedIn, &#8220;<em>InMail messages are sent directly to another LinkedIn member you&#8217;re not connected to.<\/em>&#8221; This is an interesting aspect since it opens up the scope of the attack not only to the compromised account&#8217;s own contacts but also to other users.<\/p>\n<p>This email was sent via LinkedIn and had a custom &#8216;<a href=\"https:\/\/www.linkedin.com\/help\/linkedin\/answer\/4788\/security-footer-message-in-linkedin-emails?lang=en\" target=\"_blank\" rel=\"noopener\">Security Footer<\/a>&#8216;. LinkedIn will send messages &#8220;<em>that include a security footer message with your name and professional headline to help you distinguish authentic LinkedIn emails from &#8220;phishing&#8221; email messages<\/em>&#8220;, although it does point it out that it is no guarantee that the email is legitimate. In other words, the delivery method is to be trusted, but the content may not. The same can be said for phishing pages that use HTTPS &#8211; which is the case here &#8211; making content delivery secure but the content itself fraudulent.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/securityfooter.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19649 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/securityfooter.png\" alt=\"\" width=\"1048\" height=\"603\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/securityfooter.png 1048w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/securityfooter-300x173.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/securityfooter-600x345.png 600w\" sizes=\"auto, (max-width: 1048px) 100vw, 1048px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 4: The phishing email received via LinkedIn that includes the &#8216;Security Footer&#8217;<\/em><\/p>\n<p>However, there&#8217;s a caveat here. To use InMail, you need a Premium account which comes at a hefty monthly cost. There&#8217;s a <a href=\"https:\/\/blog.knowbe4.com\/the-linkedin-phish-how-they-did-it\" target=\"_blank\" rel=\"noopener\">good article<\/a> by <a href=\"https:\/\/www.knowbe4.com\/\" target=\"_blank\" rel=\"noopener\">KnowBe4<\/a> detailing a phishing attack using LinkedIn&#8217;s own platform via InMail. The researchers showed how trivial it is to create a free account, start connecting with people, and finally upgrade to a Premium account in order to start sending scams via InMail. But the conclusion of their research is that this particular attack would not scale well due to limited InMail credits, making the operation way too expensive.<\/p>\n<p>This limitation does not apply here though since the crooks are not creating (and paying for) their own accounts, but rather leveraging existing ones. Therefore, they have little to worry about burning free credits and tarnishing their victim&#8217;s reputation so long as it allows them to deliver their payload far and wide.<\/p>\n<h3>Personal security and its implications<\/h3>\n<p>We do not know how (malware, other phishing attacks, etc.) or how many LinkedIn accounts were compromised in this campaign. It&#8217;s also unclear whether the shortened URLs are unique per hacked account or not, although we think they might be. The user whose account was hacked had over 500 connections on LinkedIn and based on <a href=\"https:\/\/hootsuite.com\/\" target=\"_blank\" rel=\"noopener\">Hootsuite<\/a>&#8216;s stats, we know 256 people clicked on the phishing link.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/clickstats.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19650 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/clickstats.png\" alt=\"\" width=\"747\" height=\"334\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/clickstats.png 747w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/clickstats-300x134.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/clickstats-600x268.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/clickstats-604x270.png 604w\" sizes=\"auto, (max-width: 747px) 100vw, 747px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 5: A Premium member account with 500+ connections caught sending phishing link<\/em><\/p>\n<p>This kind of attack via social media is not new &#8211; we have seen hacked Skype or Facebook accounts send spam &#8211; but it reminds us of how much more difficult it is to block malicious activity when it comes from long standing and trusted user accounts, not to mention work acquaintances or relatives. This also makes such attacks more credible to potential victims and can lead to a snowball effect when victims become purveyors of phishing links themselves.<\/p>\n<p>If your LinkedIn account gets compromised, you should immediately review its settings to change your password and enable two-step verification (instructions <a href=\"https:\/\/www.linkedin.com\/help\/linkedin\/answer\/544\/turning-two-step-verification-on-and-off?lang=en\" target=\"_blank\" rel=\"noopener\">here<\/a>). Additionally, you can post a quick update on your timeline that lets your contacts know you were hacked and that any previous message you may have sent with links should be carefully vetted.<\/p>\n<p><em>We&#8217;d like to thank <a href=\"https:\/\/twitter.com\/acfou\" target=\"_blank\" rel=\"noopener\">@acfou<\/a> for sharing a sample of this campaign with us.<\/em><\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Phishing message:<\/p>\n<pre>I have just shared a document with you using GoogleDoc Drive,   View shared document http:\/\/ow.ly\/[]<\/pre>\n<p>Redirection and phishing page:<\/p>\n<pre>ow[.]ly\/qmxf30eWLyN  dgocs[.]gdk.mx\/new\/index.php  dgocs[.]gdk.mx\/new\/index.php?i=1  cakrabuanacsbali[.]com\/wp-rxz\/index.php<\/pre>\n<p>Decoy Google Docs Wells Fargo file:<\/p>\n<pre>docs.google.com\/document\/d\/13qUEngtHuKjtvGoPaMl3x6cEnT2oO6lSWOccM-PkXKk\/edit<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/compromised-linkedin-accounts-used-to-send-phishing-links-via-private-message-and-inmail\/\">Compromised LinkedIn accounts used to send phishing links via private message and InMail<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/compromised-linkedin-accounts-used-to-send-phishing-links-via-private-message-and-inmail\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 12 Sep 2017 17:24:39 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/compromised-linkedin-accounts-used-to-send-phishing-links-via-private-message-and-inmail\/' title='Compromised LinkedIn accounts used to send phishing links via private message and InMail'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2013\/11\/privacy-phishing.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A recent attack uses existing LinkedIn user accounts to send phishing links to their contacts via private message but also to external members via email.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/social-engineering-threat-analysis\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/gmail\/\" rel=\"tag\">gmail<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/inmail\/\" rel=\"tag\">inmail<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/linkedin\/\" rel=\"tag\">LinkedIn<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scam\/\" rel=\"tag\">scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/compromised-linkedin-accounts-used-to-send-phishing-links-via-private-message-and-inmail\/' title='Compromised LinkedIn accounts used to send phishing links via private message and InMail'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/compromised-linkedin-accounts-used-to-send-phishing-links-via-private-message-and-inmail\/\">Compromised LinkedIn accounts used to send phishing links via private message and InMail<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11308,14676,11448,3764,3924,3985,10510,10494],"class_list":["post-9244","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-gmail","tag-inmail","tag-linkedin","tag-malware","tag-phishing","tag-scam","tag-social-engineering","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9244"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9244\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9244"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}