LinkedIn users attacked by Zeus spam

LONDON – Networking site LinkedIn is being used as the lure for a huge spam campaign designed to infect U.K. and U.S. businesses with the data-stealing Zeus/Zbot Trojan, Cisco Systems Inc. has reported.

After appearing on Sept. 27, by 11 a.m. BST (6 a.m. eastern), spam featuring a bogus LinkedIn reminder accounted for up to a quarter of all spam detected by the company in a 15-minute period.

Users are asked to review the contact request for a fictitious user by clicking on an embedded link in the usual LinkedIn style. This takes victims to a page that asks them to wait before sending them to Google, unaware that anything untoward has happened. By that point, Zeus will have attempted to jump on to the target PC.

Assuming it is not detected by the PC’s antivirus software – and there is plenty of evidence that Zeus variants can get past many such defences – this particular Zeus variant monitors browser entries for online bank account credentials.

“This strongly suggests that the criminals behind this attack are most interested in employees with access to financial systems and online commercial bank accounts,” said a Cisco statement.

The problem with the attack is that LinkedIn thrives on members being contacted by new members, so the fact that the apparent message sender is unknown would not necessarily alert users not to click on the link.

The defence against this attack is most businesses would be anti-spam filters at gateway level and antivirus, plus any defences such as Trusteer’s Rapport browser plug-in.

Another barrier is that companies accessing online bank account use a dedicated PC that does not run any other application.

LinkedIn has been used for spam campaigns in the past but relatively infrequently compared to consumer rivals such as Facebook and Twitter, which can also be used to attack business users.

“Targeting social network users for distributing financial malware is a smart move for the criminals,” commented Trusteer CEO, Mickey Boodaei on the latest attack.

“These attacks are much more likely to succeed than phishing attacks on banks. Once Zeus is installed on the user’s computer then the criminals get access not only to login information but also to real-time transactions and other sensitive information on the victim’s computer,” he said.
 

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Previous article
Next article

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now