Information Security Blog

LinkedIn Phishing – Time for a Social Engineering Penetration Test?

LinkedIn Phishing – Time for a Social Engineering Penetration Test?

2 Flares

2 Flares


×

LinkedIn has certainly become one of the most popular business-to-business social networking tools. Not surprisingly, it is becoming a target for phishing attempts. Before I share screenshots and notes on how to determine if the email is real or fake, I want to mention that we verified that the fake email we received is in fact a phishing scam. We asked Mike Gargiullo, Sr. Security Consultant at Pivot Point Security, to run Wget and found that the endpoint URL contained suspicious JavaScript which was configured to run on page visit. We didn’t deconstruct the code to see how it worked – perhaps next blog!.

A LinkedIn Phishing Email

If you notice in the screenshot, the subject contains the person’s name, but also doesn’t match a true LinkedIn connection request subject line. A LinkedIn connection request subject is “Join my network on LinkedIn”.

The third person’s name mentioned does not match the others. That is a good indicator of a legitimate LinkedIn email. The highlighted text that states “Confirm that you know Neal” does not match a true LinkedIn email either. As you will see in a real connection email from LinkedIn, there is a clean yellow button that says “Accept”. Next to the button is a text link which states, View invitation from persons name“. This is another clue whether the email is real or not.

fake linkedin email

Click to enlarge

A Real LinkedIn Email

As you can see, there are major differences between the two emails on top of what I already mentioned. Like the random empty box and gibberish instead of a copyright symbol.

linkedin email real

Click to enlarge

The Email Source

So now that you have seen the actual emails, I want to share the source code behind both the real and phishing emails.

linkedin email real source

You can see in the screenshot (above) that the link in the real email pointed to LinkedIn.com. However, in the next screenshot (below) you notice different URL.

linked email fake source

In the fake LinkedIn email, you will see that the URL is not from LinkedIn and also has a forumx.php landing page. LinkedIn would not send you there.

Take Away

So what does this mean? If you’re a normal business user - don’t click the link. Follow the steps outlined below. If you’re a CSO or equivalent; make sure to be vigilant with your Security Awareness Training. If you want to test its effectiveness engage a third-party security firm to conduct a Social Engineering exercise to gauge whether you are vulnerable to attacks of this nature. A word of caution – 34% of the people we have targeted in Phishing centric Social Engineering tests over the last year have clicked the malicious link and provided sensitive corporate data (usually domain credentials!).

  1. Visit your LinkedIn account by typing the URL in your browser manually.
  2. Verify if you have a connection request in your LinkedIn Inbox
  3. If you do not, then go back to your email client
  4. Pull up the fake email
  5. Click mark as spam or junk
  6. Delete the email

Thanks for reading,

Scott

PS. Please join us on LinkedIn.

0


Download: Information Security Attestation Guide

Information Security GuideA Best-Practices Guide to Information Security Attestation

Download our proven Information Security Guide to simplify the process of protecting your data, proving you’re secure and growing your business.

Free Whitepaper: Stop Wasting Money on Penetration Testing

penetration-testing-whitepaper

Penetration Testing is most frequently performed to:

  • Substantiate the net effectiveness of a mature control environment
  • Prove to a third party that an environment is secure/trustworthy
  • Quickly assess the security of a less mature control environment (in a sense a technical risk assessment)
  • To validate that significant changes did not have unanticipated results

Free Whitepaper: Five Best Practices for SIEM

siem-whitepaper

The promise of SIEM is the consolidation of all relevant Security Event Logs from disparate sources into a single unified and normalized data store.

Best Practices for Firing A Network Security Administrator

Firing A Network Security AdministratorWant to know how to fire a Network Admin? Need to know what precautions to take? Firing any employee can be a stressful event. Firing one who has significant knowledge of and privileged access to your Information Technology/Security infrastructure is even more stressful, as the risks are so notable.

Free Download: A Best Practices Guide to Database Security

database security roadmap

Because data is only as secure as the systems & processes it relies on – a holistic approach to data security is essential. This roadmap is not meant to be exhaustive but rather to stimulate the necessary thought process to put you on the path to good data security.

Free Download: ISO 27001 Vendor Selection Toolkit

“ISOOur ISO 27001 Toolkit will help you to select an ISO 27001 consulting firm.
  • Review the Issues Critical to Your Environment
  • "Vet" Vendor Qualifications
  • Compare the Top 3 Vendors
  • Sample RFP Included

Free Download: ISO 27001 Implementation Roadmap

ISO 27001 RoadmapHave no fear – our “roadmap” will guide you, step by step, through the entire ISO 27001 process.

Getting to ISO 27001 certification is a process made up of things you already know – and things you may already be doing!

Is ISO 27001 Right for (Y)our Organization?

iso-27001-webinar

Thinking about ISO 27001 Certification? View our free On-Demand ISO 27001 Webinar

  • How to deal with increasing threats
  • How to manage multiple regulatory requirements
  • How to handle client requests for attestation
  • To validate that significant changes did not have unanticipated results

About the Author:

Marketing at Pivot Point Security

Add a Comment

2 Flares Twitter 0 Facebook 1 Google+ 1 Pin It Share 0 LinkedIn 0 Reddit 0 StumbleUpon 0 Email -- 2 Flares ×