LinkedIn ranks high in phishing attacks


If you use LinkedIn, be careful: the professional networking site is one of the most popular targets for phishing attacks.

Check Point cybersecurity researchers analyzed phishing emails sent during the first three months of this year and their conclusion is clear: more than half of phishing attacks (52%) attempted to exploit LinkedIn.

Emails that mimic LinkedIn communication

These emails mimic emails sent by LinkedIn. But when the target of the attack clicks on the link, she ends up on a mirror site: the page looks like the LinkedIn interface, but if she enters her email address and password, she sends them to the attacker, who can then use this information to log into his victim’s account.

These attacks are not particularly sophisticated. But by targeting a commonly used service like LinkedIn, attackers are betting that many victims won’t realize it’s a phishing attack.

“These phishing attempts are simply attacks of opportunity. Criminal groups orchestrate these large-scale phishing attempts, with the aim of tricking as many people as possible into giving up their personal data. Some attacks will attempt to gain the upper hand on individuals or steal their information, such as those we see with LinkedIn,” says Omer Dembinsky, data research group leader at Check Point Software.

Phishing campaigns and distribution of malware

While LinkedIn was the most commonly spoofed brand in phishing attacks during the reporting period, it is far from the only known company that cybercriminals attempt to leverage in their attacks. Other brands spoofed by cybercriminals in phishing emails include DHL, Google, Microsoft, FedEx, WhatsApp, Amazon and Apple.

In many cases, the goal is to steal usernames and passwords. But researchers warn that in some cases malicious links and attachments are used to spread malware.

The reason cybercriminals run mass phishing campaigns is that, unfortunately, they tend to work: recipients click on malicious links and download attachments.

Yet there are often telltale signs that an email could be a malicious phishing message.

How to protect yourself from phishing on LinkedIn?

“Employees should be trained to spot suspicious anomalies: misspelled domain names, typos, incorrect dates, and other details that can expose a malicious email or text message. LinkedIn users, in particular, need to be extra vigilant over the coming months,” warns Omer Dembinsky.

LinkedIn allows its users to use multi-factor authentication. Its use can be an additional barrier against phishing attacks.

“Our teams are working on action against those who attempt to harm LinkedIn members through phishing. We encourage members to report suspicious posts,” a LinkedIn spokesperson told ZDNet. He adds that the professional social network has published advice to protect yourself, and in particular recommends activating two-step verification. “To learn more about how members can identify phishing messages, check out our help center here,” he also recommends.

“Your account has been hacked”

To identify a phishing attempt, several elements must be checked: messages that contain spelling or grammatical errors, that are not addressed to you personally or that claim an emergency and urge you to deal with the situation urgently must alarm the recipient. You should also watch out for emails prompting you to download an attachment, to install a software update for example.

Among the tactics commonly used in phishing emails, there is also that of the hacked account alert. The email claims your account has been hacked, and asks you to change your password. If you are unsure whether this alert is legitimate or not, the best thing to do is not to click on the URL of the email and go directly to the website in question to change your password or check the information. If you really have a problem with your account, the site will let you know and you can then take the necessary measures.

Source: ZDNet.com





Source link -97