Wednesday, June 19, 2024

Hackers Abusing LinkedIn’s Direct Messaging Service to Deliver More_eggs Malware via Fake Job Offers

A new malware campaign that impersonates as legitimate staffing companies abuse messaging services to deliver More_eggs malware.

The campaign primarily targeted US companies that include retail, entertainment, pharmacy, and others that commonly employ online payments, such as online shopping portals.

Threat actors send direct message abusing Linkedin message service to the victim’s pretending to be from a staffing company offering employment.

Proofpoint researchers observed a number of campaigns since 2018, that abuses message service to offer fake jobs and follow-up email’s to deliver More_eggs malware.

More_eggs Malware Campaign

Threat actors use to create a Linkedin profile targeting individuals in a certain company and send them invitations with a short message.

More_eggs malware

Following the message attackers will send an Email to target’s work address reminding about the invitation. The Email contains a direct link added within the body of Email or as a PDF attachment embedded with URL.

Upon clicking URL or opening the PDF it takes victims to a spoofed landing page that triggers the download of Microsoft Word file with malicious macros embedded. In some cases instead of Microsoft Word file, it is JScript loader.

More_eggs malware

The campaign was first spotted by Brian Krebs that targets specific anti-money laundering officers at credit unions.

Threat actors used number of tools to distribute the malware

Taurus Builder – Tool purchased from underground markets, used to create malicious word documents.

VenomKit – An exploit kit to maintain unauthorized access on compromised servers.

More_eggs – Downloaded malware that used to download additional payloads.

Threat actors continue to increase their sophistication methods to deliver malware using a variety of campaigns. Here you can see the complete list of IOCs.

Related Read

Wannamine Malware Still Penetrate the Unpatched SMB Computers using NSA’s EternalBlue Exploit

New Xbash Malware Attack on Linux & Windows with Botnet, Ransomware & Coinminer Capabilities


Latest articles

Singapore Police Arrested Two Individuals Involved in Hacking Android Devices

The Singapore Police Force (SPF) has arrested two men, aged 26 and 47, for...

CISA Conducts First-Ever Tabletop Exercise Focused on AI Cyber Incident Response

On June 13, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) made history by...

Europol Taken Down 13 Websites Linked to Terrorist Operations

Europol and law enforcement agencies from ten countries have taken down 13 websites linked...

New ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux Systems

Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data.ARM's...

Operation Celestial Force Employing Android And Windows Malware To Attack Indian Users

A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...

Hackers Employing New Techniques To Attack Docker API

Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles