{"id":22740,"date":"2023-08-18T16:10:55","date_gmt":"2023-08-19T00:10:55","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/08\/18\/news-16470\/"},"modified":"2023-08-18T16:10:55","modified_gmt":"2023-08-19T00:10:55","slug":"news-16470","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/08\/18\/news-16470\/","title":{"rendered":"Attackers demand ransoms for stolen LinkedIn accounts"},"content":{"rendered":"<p>An ongoing campaign targeting LinkedIn accounts has led to victims losing control of their accounts, or being locked out following repeated login attempts.<\/p>\n<p>Whether the attackers are using brute force methods or credential stuffing isn&#8217;t known, but because some victims are being being locked out following a great number of failed attempts, you might suspect brute force methods. It&rsquo;s also not unthinkable that the attackers are using a combination of attack methods. Credential stuffing is a popular tactic of attempting to access online accounts using username-password combinations acquired from breached data. In a brute force attack attackers typically try a lot of common passwords.<\/p>\n<p>Either way, victims are complaining about slow response times.<\/p>\n<p>The campaign is targeting LinkedIn users all over the world. It pressures the victims that have lost control of their accounts into paying a ransom to avoid having their accounts deleted by the attackers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/08\/easset_upload_file6789_276093_e.png\" alt=\"victim asking for help: Someone has hacked my account and asking for money and no response from LinkedInelp\" width=\"574\" height=\"158\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p align=\"center\"><em>The X account of LinkedIn Help is swamped with similar messages<\/em><\/p>\n<p>Victims are usually made aware of the take-over by a notification that the email address associated with their account has changed. In many of the examples we saw the new email address was linked to the Russian &ldquo;rambler.ru&rdquo; service. This does not necessarily mean the attack is originating from Russia, but it&rsquo;s not unthinkable that the accounts will be used in disinformation campaigns. According to one victim we spoke to the attackers added fake accounts to their connections.<\/p>\n<p>But the accounts could also be used to distribute malware, phishing campaigns, or other types of fraud. And if that&rsquo;s the case, the deletion of the account sounds better to me than having your reputation damaged.<\/p>\n<p>From complaints seen by <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/linkedin-accounts-hacked-in-widespread-hijacking-campaign\/\" target=\"_blank\" rel=\"nofollow\">BleepingComputer<\/a>, LinkedIn support has not been helpful in recovering the breached accounts, with users just getting frustrated by the lack of response.<\/p>\n<p>The LinkedIn Help account has pinned a message to say:<\/p>\n<blockquote><p>&ldquo;Hey there! \ud83d\udc4b We&#8217;re experiencing an uptick in questions from our members, causing longer reply times. Rest assured, we&#8217;re doing our best to assist you! For account-specific inquiries, please DM us the details and your email address. We appreciate your patience. Thanks! \ud83d\ude4c&rdquo;<\/p><\/blockquote>\n<p>The best defence against brute force attacks, credential stuffing, and other password attacks, is to set up two-step verification.<\/p>\n<p>Setting up MFA for LinkedIn with Okta turned out to be painful because LinkedIn does not provide a QR code but a secret key which is so long that it&rsquo;s hard to get it right the first, or second time. But since it&rsquo;s safer than using the SMS 2FA, this is how it&rsquo;s done:<\/p>\n<ul>\n<li>Open Settings &amp; Privacy<\/li>\n<li>Under Sign in &amp; security<\/li>\n<li>Select Two-step verification<\/li>\n<li>Set the option to on and you will be presented with two choices<\/li>\n<li>Choose the Authenticator app method and follow the instructions from there<\/li>\n<\/ul>\n<p>You will receive an email confirming the change that tells you: From now on, you can use your authenticator app to get a verification code whenever you want to sign in from a new device or browser.<\/p>\n<hr \/>\n<p dir=\"ltr\">Malwarebytes EDR and MDR removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\" class=\"blue-cta-bttn\">TRY NOW<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/08\/linkedin-account-take-over-campaign-leads-to-frustrated-victims\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Tags: LinkedIn<\/p>\n<p>Tags:  rambler.ru<\/p>\n<p>Tags:  MFA<\/p>\n<p>Tags:  brute-force<\/p>\n<p>Tags:  credential stuffing<\/p>\n<p>LinkedIn support channels are being swamped by users that have been locked out of their accounts.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/08\/linkedin-account-take-over-campaign-leads-to-frustrated-victims\" title=\"Attackers demand ransoms for stolen LinkedIn accounts\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/08\/linkedin-account-take-over-campaign-leads-to-frustrated-victims\">Attackers demand ransoms for stolen LinkedIn accounts<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[19514,21323,11448,10600,32,29994],"class_list":["post-22740","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-brute-force","tag-credential-stuffing","tag-linkedin","tag-mfa","tag-news","tag-rambler-ru"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22740"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22740\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}