Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

State-sponsored hackers from Iran aim attack on U.S LinkedIn users

 

FireEye an information security company says that APT34 a hacking group receiving Iranian government's support is, these days, carrying out a phishing scam to attack people who browse LinkedIn the professional social media website. During this scam, its operators dispatch American users of LinkedIn, messages inviting them for being part of professional networks while install malware onto those users' computers after which extract secret details via a backdoor.

 

FireEye discovered the malware as being new variants and the backdoor as enabling data exchange. Apart from these a different tool would filch credentials from certain Windows vault the storing place of those credentials. The sinister cyber assaults stands out prominently as they target high-profile entities like critical infrastructures, resources and governments by depending upon credentials for triggering off "real-world" security flaws. A chain is formed where the links are targeted by turn.

 

LinkedIn, reportedly, has over the scam become a thriving platform for APT34 with its attacks, considering that people in large numbers simply connect and engage devoid of having the identical suspicions they may assign to e-mails that unfamiliar sources send. FireEye says social-networking websites are very effective in delivering malicious content when the target organization concentrates intensely on defenses safeguarding e-mails for deterring hacks. www.forbes.com posted this, July 22, 2019.

 

Upon conducting more investigation, FireEye found that a spreadsheet labeled ERFT-Details.xls dropped the malware. It would come through a LinkedIn missive impersonating University of Cambridge's research staff. In an interview with a target victim, FireEye learnt that the social exchange of missives started with asking for resumes related to possible job vacancies. FireEye's analysis suggests APT34 hasn't only this time made use of job offer and/or academia exchangeable messages within its different scams.

 

The company observes that cyber-criminals have been frequently changing the shapes of their ruses for bypassing detection mechanisms, deploying fresh social-engineering strategies and malware tools. For hackers, LinkedIn and similar platforms prove to be a most suitable harvesting ground of personal information.

 

The International Institute of Cyber Security states the latest LinkedIn scam clearly shows the way Iran experiments with 'cyber-warfare,' preferring towards attacking targets other than the military.

 

» SPAMfighter News - 06-08-2019

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next