With unemployment At a strong level And the economic performance is weird, Covid-related reversals, I think we can all agree that job hunting is now a difficult slogan. Among all these, do you know what workers really don’t need? LinkedIn inboxes loaded with malware. Yes, they don’t need it at all.
However, due to a group of internet bastards, this is clearly something that some people might get.
Security company eSentire recently Published a report Describe in detail how hackers are associated with an organization called “Golden Rooster” (I’m not sure who proposed it), which has been launching a malicious campaign to rob job applicants of their desire for ideal positions.
These ones Election campaigns include inducing unsuspecting business professionals to click on job opportunities with the same titles as their current positions. A message slides into the victim’s DM, and is then decoyed with “offers”. These offers are actually manipulated with spring-loaded .zip files. Inside the .zip is a fileless malware called “more_eggs” that can help hijack the target device. The researchers explained in detail how the attack works:
…If the LinkedIn member’s job is listed as Senior Account Manager-International Freight The title of the malicious zip file is Senior Account Manager-International Freight Position (please note that “position” is added at the end). After opening the fake job opportunity, the victim unknowingly started the stealth installation of the fileless backdoor more_eggs.
No matter who they are, the “chicks” may not be carrying out these attacks themselves.On the contrary, they are stepping on what is classified Malware as a Service (MaaS)-This means that other cybercriminals will buy malware from them to carry out their own hacking activities.The report states that this is I don’t know who it is Yes Behind the nearest activity.
A backdoor Trojan horse program such as “more_eggs” is basically a program that allows other more destructive malware to be loaded into the system of a device or computer. Once criminals use Trojan horses to enter the victim’s system, they can deploy ransomware, banking malware, or credential stealing programs and other things to cause greater damage to the victim.
Rob McLeod, senior director of eSentire’s Threat Response Unit (TRU), said the event was “especially worrying” given how this compromise could pose a “serious threat” to businesses and professionals.
“Since the COVID pandemic, the unemployment rate has risen sharply. Now is the opportunity to take advantage of desperate job seekers. Therefore, in these difficult times, customized job bait is even more tempting.”
We contacted LinkedIn to find out what they thought of the whole situation, and if they respond, this story will be updated.Considering that employers usually don’t just provide You are engaged in a job, and you think that this campaign will not be too difficult to avoid. However, people will always click on something randomly on the Internet, usually out of curiosity, if nothing else. Suffice it to say, if the job offer you get looks too good to be true, it may be best to avoid it.
Update, 9:12pm When contacted by email, a LinkedIn spokesperson provided the following statement:
“Millions of people use LinkedIn every day to search and apply for jobs, and when doing job searches, safety means you know that the recruiter you’re chatting with is who they say, and the work that is excited about you is real and Truth and how to detect fraud. We do not allow fraudulent activities anywhere on LinkedIn. We use automatic and manual defenses to detect and process fake accounts or fraudulent payments. This website bans any accounts that violate our policies or Job posting.”