Bogus LinkedIn Messages Speculate Work Comeback to Pollute Users with Trojans
Malware authors are again using LinkedIn's popularity and users' social media engagement after the holidays, according to security firm, Bitdefender. Experts deemed that cybercriminals are depending on the truth that after the holiday off, many people are keen to reinforce their connections with the social media, in view to which, they are liable to click on links coming from various notifications that informs them of their "personal messages."
The spiteful links have been set up to point various websites that are hosted on US, Russian, Italian or UK domains.
In a number of cases, victims are indulging to malevolent sites that are designed to trap them into handing over their personal information, which the crooks can employ for the purpose of identity theft and other unlawful operations.
On the contrary, the links could also indicate Trojan-serving sites. In one instance, experts recognized the Trojan known as JS BlacoleRef W - an information-stealing threat that's not easy to remove. This Trojan, as accords to Bitdefender experts, can also hijack the user's address book to spam contacts with dangerous attachments.
Awfully, it is because of malicious campaigns of before mentioned kinds that increasing in malware across the internet, said by the experts evaluating the campaign comment. In fact, according to Bitdefender surveys, Trojan-type malware found in the world. Trojan-type infection goes simultaneously in-connection with the botnet: around 15% of computers are part of networks managed by cybercriminals, they add.
To avoid phishing and other e-threat, users are suggested to install antivirus software and keep it updated. It can block spam but also malicious websites where users unconsciously land on, said by security experts.
In the end and on a nutshell, LinkedIn's users are not experiencing the attack for the first time from cyber thugs. In October 2012, malware-ridden emails supposing from LinkedIn asked recipients to click buttons to accept or decline an invitation to connect with the user. The LinkedIn logo was in the email and seems very much authentic LinkedIn invitation message. However, when the links in the messages were clicked they led to compromised sites that have no link with LinkedIn.
Related article: Bogus News Site Spreads Trojan
» SPAMfighter News - 1/16/2013
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!