{"id":89933,"date":"2021-05-28T17:25:17","date_gmt":"2021-05-28T11:55:17","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=89933"},"modified":"2023-02-20T16:06:35","modified_gmt":"2023-02-20T10:36:35","slug":"linkedin-phishing-scam-hackers-target-users-with-fake-job-offers","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/linkedin-phishing-scam-hackers-target-users-with-fake-job-offers\/","title":{"rendered":"LinkedIn Phishing Scam: Hackers target users with fake job offers"},"content":{"rendered":"<p>LinkedIn is a popular social networking platform that is focused on professional networking and the business community. On this platform, users are focused almost entirely on making connections and finding jobs. But things are not always as they seem. Of late, LinkedIn is emerging as one of the most popular social networking sites used by attackers for <a href=\"https:\/\/blogs.quickheal.com\/beware-email-attachments-can-make-victim-spear-phishing-attacks\/\">phishing attacks<\/a>.<\/p>\n<p>In one of the recent alleged breaches at LinkedIn, attackers claimed that \u201cScraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof\u201d. In this\u00a0<a href=\"https:\/\/cybernews.com\/news\/stolen-data-of-500-million-linkedin-users-being-sold-online-2-million-leaked-as-proof-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">data breach<\/a>\u00a0LinkedIn profiles, user IDs, email addresses, phone numbers, professional titles, job-related descriptions data were leaked. It is suspected that attackers use this data and harvest user credentials and other personal information with phishing attacks and more. Although the official statement from\u00a0<a href=\"https:\/\/news.linkedin.com\/2021\/april\/an-update-from-linkedin\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a>\u00a0on this data is that \u201c<em>This was not a LinkedIn data breach, and no private member account data from LinkedIn was included in what we\u2019ve been able to review<\/em>.\u201d<\/p>\n<p>While analysing such LinkedIn messages or emails, we observed that attackers are spear-phishing the victims with tiny or shorten URLs using the job description or details listed on the target\u2019s LinkedIn profile. When the unsuspecting victim clicks on the URL, the victim is redirected to phishing links and then to a fake Microsoft 0-365 login to harvest the credentials. In some cases, attacks have used links that download banking malware or backdoors on the victim\u2019s machine.<\/p>\n<p><strong>Detailed flow diagram<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89934 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig-1.flow_-650x235.png\" alt=\"\" width=\"650\" height=\"235\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-1.flow_-650x235.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-1.flow_-300x108.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-1.flow_-768x277.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-1.flow_-789x285.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-1.flow_.png 1460w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 1. Flow Diagram\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n<h3>Sample Spam LinkedIn Message<\/h3>\n<p>Here is a sample LinkedIn message, which looks like a job offering message with a malicious link.<\/p>\n<p>\u201c<em>Hi there, I hope you are doing well! We have a personal project from a client I am presently taking on. It is still in the initial stages of follow-up. From your profile, we see your competencies could be useful. Kindly access this proposal via the link below and advice. (<\/em><em>tinyurl[.]com[\/]ndependentConsultantInTelecom<\/em><em>) We look forward to your prompt and positive response. Kind Regards, Independent Consultant in Telecom and IT Services Industry<\/em>\u201d<\/p>\n<p>While analyzing URL \u201c<strong>tinyurl[.]com\/LeaderatCiscoSystems<\/strong>\u201d redirected to a hardcoded one-drive link -&gt;<\/p>\n<div class=\"mb-3\" style=\"border: solid 1px #000000; padding: 20px;\">\u201chttps[:]\/\/onedrive[.]live[.]com\/?authkey=%21AK44ek3RzZkt3sk&amp;cid=25AEBC3DBC26A975&amp;id=<br \/>\n25AEBC3DBC26A975%21120&amp;parId=25AEBC3DBC26A975%21119&amp;o=OneUp\u201d<\/div>\n<p>This link is then downloaded as a PDF file.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89935 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig-2.-PDF-file-650x312.png\" alt=\"\" width=\"650\" height=\"312\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-2.-PDF-file-650x312.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-2.-PDF-file-300x144.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-2.-PDF-file-768x369.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-2.-PDF-file-789x379.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-2.-PDF-file.png 1127w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 2. PDF file<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Once we open the PDF file, it shows &#8220;view message folder&#8221; as a clickable link. Upon click, it redirects to<\/p>\n<p>https[:]\/\/motemoat[.]net\/proposal\/owa\/index.php, which further redirects to a long URL as given below:<\/p>\n<div class=\"mb-3\" style=\"border: solid 1px #000000; padding: 20px;\">\u201chttps[:]\/\/motemoat[.]net\/proposal\/oWa\/1c7d4ce11e790d9a70714069a60fd205\/&amp;(+y6+6==&amp;=60~wuz9%5Ep0&amp;))~%5Epzz&amp;%5Eppzp=ke9p$=0=z~pwyeea0x%60|%5Ex=@+wpy9w&amp;&amp;+<br \/>\n6+wpkp&amp;90w&amp;=a~a=&amp;+$p0.php?login=&amp;.verify?service=mail&amp;data:text\/html;js6\/main.jsp?sid=CAgbePXXjcVpfthPNgXXCcgDQZImqqTE&amp;df=webmail126#module=welcome.WelcomeModule<br \/>\n%7C%7B%7D=default&amp;ltmplcache=2&amp;emr=1&amp;osid=1#identifier\u201d<\/div>\n<p>The above URL shows a fake <a href=\"https:\/\/blogs.quickheal.com\/phishers-using-custom-404-not-found-error-page-steal-microsoft-credentials\/\">Microsoft<\/a> login page as below &#8211;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89936 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig-3\u2013-Fake-Microsoft-login-page-650x335.png\" alt=\"\" width=\"650\" height=\"335\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-3\u2013-Fake-Microsoft-login-page-650x335.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-3\u2013-Fake-Microsoft-login-page-300x154.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-3\u2013-Fake-Microsoft-login-page-768x395.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-3\u2013-Fake-Microsoft-login-page-789x406.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-3\u2013-Fake-Microsoft-login-page.png 1117w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 3. Fake Microsoft Login Page<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>After adding credentials the first time, it shows an incorrect account or password.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89937 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig-4\u2013-Showing-incorrect-account-or-password.-641x390.png\" alt=\"\" width=\"641\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-4\u2013-Showing-incorrect-account-or-password.-641x390.png 641w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-4\u2013-Showing-incorrect-account-or-password.-300x182.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-4\u2013-Showing-incorrect-account-or-password.-768x467.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-4\u2013-Showing-incorrect-account-or-password..png 781w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 4\u2013 Showing incorrect account or password.<\/em><\/p>\n<p>After adding again, it shows the message \u201cYour account process is completed,\u201d here we can suspect that account credentials information gathering activity happens.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89938 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig-5.-Account-completed-650x217.png\" alt=\"\" width=\"650\" height=\"217\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-5.-Account-completed-650x217.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-5.-Account-completed-300x100.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-5.-Account-completed-768x257.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-5.-Account-completed-789x264.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-5.-Account-completed.png 961w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 5 &#8211; Account Completed\u00a0<\/em><\/p>\n<p>Further, this redirected to the legitimate outlook page.<\/p>\n<p>The same PDF file has one more URL, which is the hyperlink to the word \u201cMessage\u201d &#8220;https[:]\/\/good354la354dsaporrpe.org\/proposal\/oWa\/index.php&#8221;.<\/p>\n<p>Another URL we analyzed <strong>\u201ctinyurl[.]com\/ndependentConsultantInTelecom\u201d<\/strong>\u00a0 This URL to redirects to a one drive link.<\/p>\n<div class=\"mb-3\" style=\"border: solid 1px #000000; padding: 20px;\">\u201chttps[:]\/\/onedrive[.]live[.]com\/?authkey=%21AKHcqNAx%2D4BHzLg&amp;cid=25AEBC3DBC26A975&amp;id=25AEBC3DBC26A975%21124&amp;<br \/>\nparId=25AEBC3DBC26A975%21123&amp;o=OneUp\u201d<\/div>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89939 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig-6.-Document-file-650x310.png\" alt=\"\" width=\"650\" height=\"310\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-6.-Document-file-650x310.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-6.-Document-file-300x143.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-6.-Document-file-768x366.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-6.-Document-file-789x376.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-6.-Document-file.png 1173w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 6 &#8211; Document File\u00a0<\/em><\/p>\n<p>This link is also alive and downloads a doc file.<\/p>\n<p>Once the DOCX. the file is opened, it shows a link with the text &#8220;view message folder&#8221;. This link redirects to<\/p>\n<p>https[:]\/\/motemoat[.]net\/proposal\/owa\/index.php.<\/p>\n<p>On more URLs is a hyperlink to the word \u201cMessage\u201d &#8220;https[:]\/\/good354la354dsaporrpe.org\/proposal\/oWa\/index.php&#8221;.<\/p>\n<p>This URL is also down as of now. It\u2019s the same as the one found in the earlier PDF file variant.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89940 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/Fig-7.-Embedded-link-on-text.-650x317.png\" alt=\"\" width=\"650\" height=\"317\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-7.-Embedded-link-on-text.-650x317.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-7.-Embedded-link-on-text.-300x146.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-7.-Embedded-link-on-text.-768x374.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-7.-Embedded-link-on-text.-789x384.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/Fig-7.-Embedded-link-on-text..png 1139w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.7 &#8211; Embedded link on the text<\/em><\/p>\n<p style=\"text-align: center;\"><em>\u00a0<\/em><\/p>\n<h3>About the URLs and their respective domains<\/h3>\n<p>1. &#8220;https[:]\/\/motemoat[.]net\/proposal\/oWa\/index.php&#8221;<\/p>\n<ul>\n<li>I.P:162.241.71.191<\/li>\n<li>Domain Name: MOTEMOAT.NET<\/li>\n<li>Admin City: Scottsdale<\/li>\n<li>Admin Country: US<\/li>\n<li>Admin Email: 77a661c69ce7e338s@domainsbyproxy.com<\/li>\n<li>Admin State\/Province: Arizona<\/li>\n<li>Creation Date: 2015-03-01T20:05:14Z<\/li>\n<li>Updated Date: 2021-03-02T08:14:32Z<\/li>\n<li>Name Server: NS39.DOMAINCONTROL.COM<\/li>\n<li>Registrant Country: US<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>2. &#8220;https[:]\/\/good354la354dsaporrpe[.]org\/proposal\/oWa\/index.php&#8221;<\/p>\n<ul>\n<li>I.P :162.241.71.191 (same as above domain)<\/li>\n<li>Domain Name: GOOD354LA354DSAPORRPE.ORG<\/li>\n<li>Creation Date: 2021-04-30T01:56:00Z<\/li>\n<li>Updated Date: 2021-05-04T08:44:08Z<\/li>\n<li>Name Server: NS01.ONE.COM<\/li>\n<li>Registrant Country: GB<\/li>\n<li>Registrar URL: http:\/\/www.ascio.com<\/li>\n<li>Registrar: Ascio Technologies, Inc. Danmark &#8211; Filial af Ascio technologies, Inc. USA<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Tips to spot phishing attempts<\/h2>\n<p>&nbsp;<\/p>\n<ul>\n<li>Verify the Message or sender\u2019s account details, email IDs, name, etc., as possibly some known LinkedIn connection\u2019s account, may have been hacked or credentials stolen and account misused.<\/li>\n<li>Be aware of fake 0-365 links as it is used for credentials harvesting. Always check the URLs\/domain in the links and the page. If it looks mismatched with the original, avoid visiting and putting any credentials on such phishing pages.<\/li>\n<li>Scan attachment files coming through the message or email even if it is coming from a trusted user.<\/li>\n<li>Any open document shared on LinkedIn should never ask for 0365 or mail credentials as both have no relation.<\/li>\n<li>Even if the scam and phishing emails don\u2019t ask you to avoid getting suspected immediately, they may still try to target the legitimate LinkedIn users\u2019 credentials harvesting.<\/li>\n<li>Message Content &amp; Email format:\u00a0 Carefully read the nature of the email, intention, check grammatical errors &amp; visual style, and verify email signature.<\/li>\n<li>The most recent LinkedIn-themed spam campaigns may differ, but their purpose remains the same, so keep your account secure with a strong password.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>LinkedIn is a popular social networking platform that is focused on professional networking and the business community. On this platform, users are focused almost entirely on making connections and finding jobs. But things are not always as they seem. Of late, LinkedIn is emerging as one of the most popular social networking sites used by [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":89941,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[146,303,1674,293,1772],"tags":[534,446,1819,147,72,25,50,613,162],"class_list":["post-89933","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linkedin","category-phishing","category-scam-alert","category-spam","category-spear-phishing","tag-cybersecurity","tag-data-breach","tag-fake-job-offer","tag-linkedin","tag-microsoft","tag-phishing","tag-ransomware","tag-scam","tag-spam"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89933"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89933"}],"version-history":[{"count":10,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89933\/revisions"}],"predecessor-version":[{"id":91469,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89933\/revisions\/91469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89941"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}