Report: Hackers Are Sending Fake Job Offers on LinkedIn to Try and Steal Your Data

Social

The unfortunate rise in unemployment caused by the pandemic made communities on platforms like LinkedIn much more active. Job seekers began to hunt for new opportunities and employers started looking for candidates to fill empty positions.

Unfortunately, some hackers have decided this is a good time to try and steal data from other LinkedIn users.

Hackers Are Taking Advantage of Job Seekers on LinkedIn

According to a report by cybersecurity company eSentire, a group of scam artists collectively named “Golden Chickens” is spear phishing unsuspecting business professionals with fake LinkedIn job offers.

eSentire writes that the targeted victims are part of the healthcare technology sector. The hackers are trying to obtain the victims’ personal data by sending them a malicious ZIP file that contains a backdoor or remote access trojan.

LinkedIn app

The file is named after the position that the victim has listed on their LinkedIn profile:

For example, if the LinkedIn member’s job is listed as Senior Account Executive—International Freight the malicious zip file would be titled Senior Account Executive—International Freight position (note the “position” added to the end). Upon opening the fake job offer, the victim unwittingly initiates the stealthy installation of the fileless backdoor, more_eggs [name of the trojan].

Once more_eggs has been loaded, Golden Chickens has full access to the victim’s computer. This enables the group to view, edit, or save any files on the system, as well as grants the opportunity to infect the system with malware such as ransomware, spyware, credential stealers, etc.

What’s more, Golden Chickens reportedly sells more_eggs to other cybercriminals under a malware-as-a-service (MaaS) arrangement. Other notable advanced threat groups that use the backdoor for their own scams include FIN6, Cobalt Group and Evilnum.

Related: What Is Fileless Malware and How Can You Protect Yourself?

Rob McLeod, Sr. Director of the Threat Response Unit (TRU) for eSentire, says that more_eggs is a formidable threat to businesses and business professionals because it uses normal Windows processes to run. This means that it typically won’t be detected by anti-virus and automated security solutions.

That’s on top of the fact that the pandemic has ushered in more troubled time for some. There are lots of people desperate to find employment these days, which in some cases, leaves them more vulnerable to personalized phishing campaigns.

Be Careful of What Files You Download From LinkedIn

grow linkedin exposure

The best way to ensure you don’t get involved in a scam like this is to be mindful of what files you download to your computer.

If an employer (or anyone online, for that matter) sends you a file and you aren’t familiar with them, take a few moments to do a quick background check—see if they seem to be an authentic or credible source.

Keep an eye out for obvious indicators of bad actors as well, like the name of the file you’re being asked to download, or whether you’ve applied for a position at the company that’s messaging you.


linkedin-15

How to Deactivate or Delete Your LinkedIn Account

Need a break from LinkedIn? Here’s everything you need to know about deleting or deactivating your LinkedIn account.

About The Author

.

Products You May Like

Articles You May Like

Assassin’s Creed Mirage Will Not Get DLC, but Protagonist Basim’s Story Can Be Explored Further, Says Director
Viber Introduces AI-Powered Message Summary Feature for Users
Poco M6 4G Spotted on Several Certification Sites, May Launch Globally Soon
Lenovo Yoga Slim 7 (2024) Design Spotted in Leaked Renders; Could Debut as First Snapdragon X Elite Laptop
Samsung Galaxy Ring Model Numbers Reveal Compact Wearable Will Arrive in Eight Sizes: Report

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.